000 03585nam a22005055i 4500
001 978-0-387-25880-5
003 DE-He213
005 20250710083935.0
007 cr nn 008mamaa
008 100301s2006 xxu| s |||| 0|eng d
020 _a9780387258805
_a99780387258805
024 7 _a10.1007/b136373
_2doi
082 0 4 _a005.82
_223
100 1 _aVaudenay, Serge.
_eauthor.
245 1 2 _aA Classical Introduction to Cryptography
_h[recurso electrónico] :
_bApplications for Communications Security /
_cby Serge Vaudenay.
264 1 _aBoston, MA :
_bSpringer US,
_c2006.
300 _aXVIII, 335 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _arecurso en línea
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aPrehistory of Cryptography -- Conventional Cryptography -- Dedicated Conventional Cryptographic Primitives -- ?Conventional Security Analysis -- Security Protocols with Conventional Cryptography -- Algorithmic Algebra -- Algorithmic Number Theory -- ?Elements of Complexity Theory -- Public-Key Cryptography -- Digital Signature -- ?Cryptographic Protocols -- From Cryptography to Communication Security.
520 _aA Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes. A Classical Introduction to Cryptography: Applications for Communications Security is rich with algorithms, including exhaustive search with time/memory tradeoffs; proofs, such as security proofs for DSA-like signature schemes; and classical attacks such as collision attacks on MD4. Hard-to-find standards, e.g. SSH2 and security in Bluetooth, are also included. A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.
650 0 _aCOMPUTER SCIENCE.
650 0 _aDATA TRANSMISSION SYSTEMS.
650 0 _aCOMPUTER NETWORK ARCHITECTURES.
650 0 _aCOMPUTER COMMUNICATION NETWORKS.
650 0 _aDATA STRUCTURES (COMPUTER SCIENCE).
650 0 _aDATA ENCRYPTION (COMPUTER SCIENCE).
650 0 _aCODING THEORY.
650 1 4 _aCOMPUTER SCIENCE.
650 2 4 _aDATA ENCRYPTION.
650 2 4 _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY.
650 2 4 _aCOMPUTER COMMUNICATION NETWORKS.
650 2 4 _aCODING AND INFORMATION THEORY.
650 2 4 _aINPUT/OUTPUT AND DATA COMMUNICATIONS.
650 2 4 _aCOMPUTER SYSTEMS ORGANIZATION AND COMMUNICATION NETWORKS.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9780387254647
856 4 0 _uhttp://dx.doi.org/10.1007/b136373
_zVer el texto completo en las instalaciones del CICY
912 _aZDB-2-SCS
942 _2ddc
_cER
999 _c56502
_d56502