Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
The first thing readers will notice about this book is that it is fun to read. It is meant for browsers, for students, and for specialists wanting to know more about the subject. The footnotes give an historical background to the text, in addition to providing deeper applications of the concept that is being cited. This allows browsers to look more deeply into the history or to pursue a given sideline. Those who are only marginally interested in the area will be able to read the text, pick up information easily, and be entertained at the same time by the historical and philosophical digressions. It is rich in structure and motivation in its concentration upon quadratic orders.
This book explores the depth and breadth of the field of cryptology. It begins by tracing the development of cryptology from inception to modern-day practice. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. It is designed such that the non-professional reader may learn all aspects of secrecy yet it is still suitable as a textbook for a course on a variety of secrecy-related topics.
Offers a detailed treatment of public-key cryptography (PKC), from RSA, the first public key system devised in 1978, to the applications of PKC, including electronic cash, secret broadcasting, secret balloting systems, various banking and payment protocols, high security logins, smart cards, and biometrics.
Features appendices that contain tabular material including class numbers of real and complex quadratic fields up to 104; class group structures; and, fundamental units of real quadratic fields.
Bringing the material up to date to reflect modern applications, this second edition has been completely rewritten and reorganized to incorporate a new style, methodology, and presentation. It offers a more complete and involved treatment of Galois theory, a more comprehensive section on Pollard's cubic factoring algorithm, and more detailed explanations of proofs to provide a sound understanding of challenging material. This edition also studies binary quadratic forms and compares the ideal and form class groups. The text includes convenient cross-referencing, a comprehensive index, and numerous exercises and applications.
Includes two chapters on various applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. This book provides information on cryptanalysis, primality testing, DES, and primitive roots.
Features fundamental material, including partition theory, generating functions, and combinatorial number theory. This work offers coverage of random number generation, Diophantine analysis, and additive number theory. It also includes more applications to cryptography, primality testing, and factoring.
Explores the depth and breadth of the field of cryptology. This title begins by tracing the development of cryptology from inception to modern-day practice. It also explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, and advanced applications.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.