Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Presenting both mathematical and security perspectives, this text reviews basic theory and discusses cryptographic protocols and systems. With an emphasis on experimentation and exploration, the text offers a wealth of practical examples and numerous exercises using the open source software Sage. An accompanying CD-ROM includes the necessary codes. The author covers private and public key cryptosystems, knapsack cryptosystems, digital signatures, random number generators, elliptic curves, block ciphers, hash functions, the DES and AES, finite fields, and message authentication codes.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.