Inicio > > Seguridad informática > A Classical Introduction to Cryptography
A Classical Introduction to Cryptography

A Classical Introduction to Cryptography

Serge Vaudenay

121,31 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2010
Materia
Seguridad informática
ISBN:
9781441937971
121,31 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Preamble 1: Prehistory of Cryptography 1.1 Foundations of Conventional Cryptography 1.2 Roots of Modern Cryptography 1.3 The Shannon Theory of Secrecy1.4 Exercises2: Conventional Cryptography 2.1 The Data Encryption Standard (DES) 2.2 DES Modes of Operation 2.3 Multiple Encryption 2.4 An Application of DES: UNIX Passwords 2.5 Classical Cipher Skeletons 2.6 Other Block Cipher Examples2.7 The Advanced Encryption Standard (AES) 2.8 Stream Ciphers2.9 Brute Force Attacks 2.10 Exercises3: Dedicated Conventional Cryptographic Primitives3.1 Cryptographic Hashing 3.2 The Birthday Paradox3.3 A Dedicated Attack on MD43.4 Message Authentication Codes3.5 Cryptographic Pseudorandom Generators 3.6 Exercises 4: Conventional Security Analysis4.1 Differential Cryptanalysis4.2 Linear Cryptanalysis 4.3 Classical Security Strengthening 4.4 Modern Security Analysis4.5 Exercises5: Security Protocols with Conventional Cryptography5.1 Password Access Control 5.2 Challenge-Response Protocols 5.3 One-Time Password5.4 Key Distribution5.5 Authentication Chains 5.6 Wireless Communication: Two Case Studies 5.7 Exercises 6: Algorithmic Algebra 6.1 Basic Group Theory 6.2 The Ring Zn6.3 The Finite Field Zn 6.4 Finite Fields 6.5 Elliptic Curves over Finite Fields 6.6 Exercises 7: Algorithmic Number Theory 7.1 Primality 7.2 Factorization 7.3 Computing Orders in Groups 7.4 Discrete Logarithm 7.5 Exercises 8: Elements of Complexity Theory 8.1 Formal Computation 8.2 Ability Frontiers 8.3 Complexity Reduction 8.4 Exercises9: Public-Key Cryptography 9.1 Diffie-Hellman 9.2 Experiment with NP-Completeness 9.3 Rivest-Shamir-Adleman (RSA) 9.4 ElGamal Encryption 9.5 Exercises10: Digital Signature 10.1 Digital Signature Schemes 10.2 RSA Signature 10.3 ElGamal Signature Family 10.4 Toward Provable Security for Digital Signatures 10.5 Exercises11: Cryptographic Protocols 11.1 Zero-Knowledge 11.2 Secret Sharing 11 3 Special Purpose Digital Signatures 11.4 Other Protocols 11.5 Exercises 12: From Cryptography to Communication Security 12.1 Certificates 12.2 SSH: Secure Shell 12.3 SSL: Secure Socket Layer 12.4 PGP: Pretty Good Privacy 12.5 ExercisesFurther Readings Bibliography Index

Artículos relacionados

  • Transformation of Knowledge, Information and Data
    Patrick Van Bommel
    ...
    Disponible

    112,09 €

  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
    Disponible

    360,33 €

  • Advanced Geospatial Practices in Natural Environment Resource Management
    Today, the relentless depletion of natural resources has reached a critical juncture, demanding innovative solutions. Advanced Geospatial Practices in Natural Environment Resource Management dives into the intricate tapestry of issues jeopardizing ecosystems. This book systematically dissects the fundamental drivers, traces the historical evolution, and elucidates the underlyin...
    Disponible

    274,88 €

  • Accelerate Model Training with PyTorch 2.X
    Maicon Melo Alves
    Dramatically accelerate the building process of complex models using PyTorch to extract the best performance from any computing environmentKey Features- Reduce the model-building time by applying optimization techniques and approaches- Harness the computing power of multiple devices and machines to boost the training process- Focus on model quality by quickly evaluating differe...
    Disponible

    61,39 €

  • Spatial Statistics Illustrated
    Flora Vale / Lauren Bennett
    With approachable explanations and uncomplicated drawings, Spatial Statistics Illustrated gives readers an accessible understanding of some of the most widely used spatial statistics methods. ...
  • The Freelancepreneur Success Blueprint
    Dr. Ope Banwo
    Welcome to 'THE FREELANCEPRENEUR BLUEPRINT,' your ultimate guide to building a profitable and sustainable 6-figure freelancing business from the ground up. As a seasoned veteran with over two decades of experience in the freelance world, I’ve distilled my knowledge, insights, and proven strategies into this comprehensive blueprint. Whether you’re a novice just starting out or a...

Otros libros del autor

  • Progress in Cryptology - Africacrypt 2008
    Serge Vaudenay
    The AFRICACRYPT 2008 conference was held during June 11-14, 2008 in Casablanca, Morocco. Upon the initiative of the organizers from the Ecole n- male sup´ erieure in Casablanca, this event was the ?rst international research conference in Africa dedicated to cryptography. The conference was honored by the presence of the invited speakers Bruce Schneie...
    Disponible

    65,61 €

  • Advances in Cryptology - EUROCRYPT 2006
    Serge Vaudenay
    This book constitutes the refereed proceedings of the 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2006. 33 revised full papers are presented together with 2 invited talks. The papers are organized in topical sections on cryptanalysis, cryptography meets humans, stream ciphers, hash functio...
    Disponible

    64,67 €

  • A Classical Introduction to Cryptography
    Serge Vaudenay
    A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these...
    Disponible

    144,55 €

  • Fast Software Encryption
    Serge Vaudenay
    Fast Software Encryption (FSE) is an annual research workshop devoted to the promotion of research on classical encryption algorithms and related cryp- graphic primitives such as hash functions. When public key cryptography started to receive wide attention in the 1980s, the much older and more basic art of secret key cryptography was sidelined at man...
    Disponible

    66,22 €