Introduction to Cryptography with Coding Theory 2nd Edition Hardcover NEW

CH Media Store
(7806)
Vendedor particularRegistrado como vendedor particular
Por tanto, no se aplican las normas de protección de los consumidores derivadas de la legislación de la UE en materia de consumidores. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más información
USD45,00
Aproximadamente38,72 EUR
o Mejor oferta
Costaba USD50,00 (10% de descuento)¿Qué significa este precio?
Precio rebajado proporcionado por el vendedor
Estado:
Nuevo
La oferta finaliza en: 5 d 17 h
¡Corre antes de que se agote! 1 usuario tiene este artículo en seguimiento.
Respira tranquilidad. Se aceptan devoluciones.
Envío:
USD7,47 (aprox. 6,43 EUR) USPS Media MailTM.
Ubicado en: Woodbridge, Virginia, Estados Unidos
Entrega:
Entrega prevista entre el jue. 20 nov. y el lun. 24 nov. a 94104
Calculamos el plazo de entrega con un método patentado que combina diversos factores, como la proximidad del comprador a la ubicación del artículo, el servicio de envío seleccionado, el historial de envíos del vendedor y otros datos. Los plazos de entrega pueden variar, especialmente en épocas de mucha actividad.
Devoluciones:
30 días para devoluciones. El comprador paga el envío de la devolución..
Pagos:
    Diners Club

Compra con confianza

Garantía al cliente de eBay
Si no recibes el artículo que has pedido, te devolvemos el dinero. Más informaciónGarantía al cliente de eBay - se abre en una nueva ventana o pestaña
El vendedor asume toda la responsabilidad de este anuncio.
N.º de artículo de eBay:157412957537

Características del artículo

Estado
Nuevo: Libro nuevo, sin usar y sin leer, que está en perfecto estado; incluye todas las páginas sin ...
Book Title
Introduction to Cryptography with Coding Theory
ISBN-13
9780131862395
Country of Origin
United States
ISBN
9780131862395
Categoría

Acerca de este producto

Product Identifiers

Publisher
Pearson Education
ISBN-10
0131862391
ISBN-13
9780131862395
eBay Product ID (ePID)
45882293

Product Key Features

Number of Pages
600 Pages
Language
English
Publication Name
Introduction to Cryptography with Coding Theory
Subject
Communication Studies, General, Security / Networking
Publication Year
2005
Type
Textbook
Subject Area
Mathematics, Computers, Language Arts & Disciplines
Author
Wade Trappe, Lawrence Washington
Format
Hardcover

Dimensions

Item Height
1.5 in
Item Weight
40.3 Oz
Item Length
9.6 in
Item Width
7.4 in

Additional Product Features

Edition Number
2
Intended Audience
College Audience
LCCN
2005-048930
Dewey Edition
22
Illustrated
Yes
Dewey Decimal
005.82
Table Of Content
1 Overview Secure Communications. Cryptographic Applications 2 Classical Cryptosystems. Shift Ciphers. Affine Ciphers. The Vigen'ere Cipher. Substitution Ciphers. Sherlock Holmes. The Playfair and ADFGX Ciphers. Block Ciphers. Binary Numbers and ASCII. One-Time Pads. Pseudo-random Bit Generation. LFSR Sequences. Enigma. Exercises. Computer Problems. 3 Basic Number Theory. Basic Notions. Solving ax + by = d. Congruences. The Chinese Remainder Theorem. Modular Exponentiation. Fermat and Euler. Primitive Roots. Inverting Matrices Mod n. Square Roots Mod n. Legendre and Jacobi Symbols. Finite Fields. Continued Fractions. Exercises. Computer Problems. 4 The Data Encryption Standard Introduction. A Simplified DES-Type Algorithm. Differential Cryptanalysis. DES. Modes of Operation. Breaking DES. Meet-in-the-Middle Attacks. Password Security. Exercises. 5 AES: Rijndael The Basic Algorithm. The Layers. Decryption. Design Considerations. 6 The RSA Algorithm The RSA Algorithm. Attacks on RSA. Primality Testing. Factoring. The RSA Challenge. An Application to Treaty Verification. The Public Key Concept. Exercises. Computer Problems 7 Discrete Logarithms Discrete Logarithms. Computing Discrete Logs. Bit Commitment Diffie-Hellman Key Exchange. ElGamal Public Key Cryptosystems. Exercises. Computer Problems. 8 Hash Functions Hash Functions. A Simple Hash Example. The Secure Hash Algorithm. Birthday Attacks. Multicollisions. The Random Oracle Model. Using Hash Functions to Encrypt. 9 Digital Signatures RSA Signatures. The ElGamal Signature Scheme. Hashing and Signing. Birthday Attacks on Signatures. The Digital Signature Algorithm. Exercises. Computer Problems. 10 Security Protocols Intruders-in-the-Middle and Impostors. Key Distribution. Kerberos Public Key Infrastructures (PKI). X.509 Certificates. Pretty Good Privacy. SSL and TLS. Secure Electronic Transaction. Exercises. 11 Digital Cash Digital Cash. Exercises. 12 Secret Sharing Schemes Secret Splitting. Threshold Schemes. Exercises. Computer Problems. 13 Games Flipping Coins over the Telephone. Poker over the Telephone. Exercises. 14 Zero-Knowledge Techniques The Basic Setup. The Feige-Fiat-Shamir Identification Scheme. Exercises. 15 Information Theory Probability Review. Entropy. Huffman Codes. Perfect Secrecy. The Entropy of English. Exercises. 16 Elliptic Curves The Addition Law. Elliptic Curves Mod n. Factoring with Elliptic Curves. Elliptic Curves in Characteristic 2. Elliptic Curve Cryptosystems. Identity-Based Encryption. Exercises. Computer Problems. 17 Lattice Methods Lattices. Lattice Reduction. An Attack on RSA. NTRU. Exercises 18 Error Correcting Codes Introduction. Error Correcting Codes. Bounds on General Codes. Linear Codes. Hamming Codes. Golay Codes. Cyclic Codes. BCH Codes. Reed-Solomon Codes. The McEliece Cryptosystem. Other Topics. Exercises. Computer Problems. 19 Quantum Techniques in Cryptography A Quantum Experiment. Quantum Key Distribution. Shor's Algorithm. 4 Exercises. Mathematica Examples Maple Examples MATLAB Examples Further Reading Bibliography Index
Synopsis
With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography., With its lively, conversational tone and practical focus, this edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field., With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. KEY TOPICS: Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. MARKET: For engineers interested in learning more about cryptography., With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.
LC Classification Number
QA268.T73 2005

Descripción del artículo del vendedor

Acerca de este vendedor

CH Media Store

99,9% de votos positivos23 mil artículos vendidos

Se unió el jul 2020
Suele responder en 24 horas
Registrado como vendedor particularPor tanto, no se aplican los derechos de los consumidores derivados de las leyes de protección de los consumidores de la UE. La Garantía al cliente de eBay sigue aplicando a la mayoría de compras. Más informaciónMás información
Visitar tiendaContactar

Valoraciones detalladas sobre el vendedor

Promedio durante los últimos 12 meses
Descripción precisa
5.0
Gastos de envío razonables
4.8
Rapidez de envío
5.0
Comunicación
5.0

Votos de vendedor (8.141)

Todas las valoracionesselected
Positivas
Neutras
Negativas
  • 1***7 (61)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    I ordered Real and Functional Analysis by Serge Lang from this seller. The book arrived on time and was extremely well packaged. The condition of the book was exactly as described by the seller, and I could not believe the price for the book. It was a great value for the money. The book's appearance and condition are excellent. I had no issues with this seller. I recommend this seller. For the quality and type of book, you cannot beat the price.
  • 6***6 (115)- Votos emitidos por el comprador.
    Últimos 6 meses
    Compra verificada
    Received the new book and it's much more than just as described. I enjoy reading the book so much that I can't put it down. The purchase price was good and the shipping cost was very reasonable. The new book was packaged in a bubble wrap shipping bag for protection and it arrived very fast. This Seller is AAA+++++ I would recommend them to anyone. Thank You Very Much!!!
  • b***r (74)- Votos emitidos por el comprador.
    Mes pasado
    Compra verificada
    Shipping was very quick, items packaged securely, better condition than I expected. Description said most were barely used/untouched, definitely matched. Great value. 10/10 seller.