Modern Cryptography: Theory and Practice by Wenbo Mao (2003, Trade Paperback)

Goodwill Industries San Diego Books (161080)
99.7% positive feedback
Price:
US $498.29
ApproximatelyRM 2,059.18
+ $44.26 shipping
Returns:
30 days return. Buyer pays for return shipping. If you use an eBay shipping label, it will be deducted from your refund amount.
Condition:
Good

About this product

Product Identifiers

PublisherPrentice Hall PTR
ISBN-10013288741X
ISBN-139780132887410
eBay Product ID (ePID)7038262352

Product Key Features

Number of Pages752 Pages
Publication NameModern Cryptography: Theory and Practice
LanguageEnglish
SubjectCommunication Studies, Networking / Vendor Specific, Security / General
Publication Year2003
TypeTextbook
Subject AreaComputers, Language Arts & Disciplines
AuthorWenbo Mao
FormatTrade Paperback

Dimensions

Item Height1.4 in
Item Weight41.3 Oz
Item Length9.2 in
Item Width7 in

Additional Product Features

Intended AudienceScholarly & Professional
Dewey Edition22
IllustratedYes
Dewey Decimal005.8/2
Table Of ContentI. INTRODUCTION. 1. Beginning with a Simple Communication Game. 2. Wrestling between Safeguard and Attack. II MATHEMATICAL FOUNDATIONS. 3. Probability and Information Theory. 4. Computational Complexity. 5. Algebraic Foundations. 6. Number Theory. III. BASIC CRYPTOGRAPHIC TECHNIQUES. 7. Encryption--Symmetric Techniques. 8. Encryption--Asymmetric Techniques. 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions. 10. Data Integrity Techniques. IV. AUTHENTICATION. 11. Authentication Protocols--Principles. 12. Authentication Protocols--The Real World. 13. Authentication Framework for Public-Key Cryptography. V. FORMAL APPROACHES TO SECURITY ESTABLISHMENT. 14. Formal and Strong Security Definitions for Public-Key Cryptosystems. 15. Provably Secure and Efficient Public-Key Cryptosystems. 16. Strong and Provable Security for Digital Signatures. 17. Formal Methods for Authentication Protocols Analysis. VI. CRYPTOGRAPHIC PROTOCOLS. 18. Zero-Knowledge Protocols. 19. Returning To "Coin Flipping over Telephone". 20. Afterremark.
SynopsisAppropriate for all graduate-level and advanced undergraduate courses in cryptography and related mathematical fields. Modern Cryptography is an indispensable resource for every advanced student of cryptography who intends to implement strong security in real-world applications. Leading HP security expert Wenbo Mao explains why conventional crypto schemes, protocols, and systems are profoundly vulnerable, introducing both fundamental theory and real-world attacks. Next, he shows how to implement crypto systems that are truly "fit for application," and formally demonstrate their fitness. He begins by reviewing the foundations of cryptography: probability, information theory, computational complexity, number theory, algebraic techniques, and more. He presents the "ideal" principles of authentication, comparing them with real-world implementation. Mao assesses the strength of IPSec, IKE, SSH, SSL, TLS, Kerberos, and other standards, and offers practical guidance on designing stronger crypto schemes and using formal methods to prove their security and efficiency. Finally, he presents an in-depth introduction to zero-knowledge protocols: their characteristics, development, arguments, and proofs. Mao relies on practical examples throughout, and provides all the mathematical background students will need., Appropriate for all graduate-level and advanced undergraduate courses in cryptography and related mathematical fields. Modern Cryptography is an indispensable resource for every advanced student of cryptography who intends to implement strong security in real-world applications. Leading HP security expert Wenbo Mao explains why conventional crypto schemes, protocols, and systems are profoundly vulnerable, introducing both fundamental theory and real-world attacks. Next, he shows how to implement crypto systems that are truly fit for application, and formally demonstrate their fitness. He begins by reviewing the foundations of cryptography: probability, information theory, computational complexity, number theory, algebraic techniques, and more. He presents the ideal principles of authentication, comparing them with real-world implementation. Mao assesses the strength of IPSec, IKE, SSH, SSL, TLS, Kerberos, and other standards, and offers practical guidance on designing stronger crypto schemes and using formal methods to prove their security and efficiency.Finally, he presents an in-depth introduction to zero-knowledge protocols: their characteristics, development, arguments, and proofs. Mao relies on practical examples throughout, and provides all the mathematical background students will need.
LC Classification NumberQA76.9.A25M3 2004
No ratings or reviews yet
Be the first to write a review