Skip to content
Scan a barcode
Scan
Added to your cart
Hardcover Introduction to Cryptography: Principles and Applications Book

ISBN: 3662479737

ISBN13: 9783662479735

Introduction to Cryptography: Principles and Applications (Information Security and Cryptography)

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Hardcover

Condition: Very Good*

*Best Available: (ex-library)

$32.39
Save $47.60!
List Price $79.99
Almost Gone, Only 1 Left!

You Might Also Enjoy

Steve Jobs
Steve Jobs
Walter Isaacson

from: $4.05

HTML and CSS: Design and Build Websites
HTML and CSS: Design and Build Websites
Jon Duckett

from: $6.09

Super Deluxe Essential Handbook (Pokémon): The Need-to-Know Stats and Facts on Over 800 Characters
Super Deluxe Essential Handbook (Pokémon): The Need-to-Know Stats and Facts on Over 800 Characters
Scholastic Inc.

from: $4.69

Surveillance Valley: The Secret Military History of the Internet
Surveillance Valley: The Secret Military History of the Internet
Yasha Levine

from: $32.18

JavaScript and jQuery: Interactive Front-End Web Development
JavaScript and jQuery: Interactive Front-End Web Development
Jon Duckett

from: $5.89

Tribal Leadership: Leveraging Natural Groups to Build a Thriving Organization
Tribal Leadership: Leveraging Natural Groups to Build a Thriving Organization
John King, Dave Logan, Halee Fischer-Wright

from: $4.39

The Innovators: How a Group of Inventors, Hackers, Geniuses and Geeks Created the Digital Revolution
The Innovators: How a Group of Inventors, Hackers, Geniuses and Geeks Created the Digital Revolution
Walter Isaacson

from: $5.09

Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
Cathy O'Neil

from: $6.09

The Pleasures of the Damned: Poems, 1951-1993
The Pleasures of the Damned: Poems, 1951-1993
Charles Bukowski

from: $10.49

Windows 10 for Seniors for Dummies
Windows 10 for Seniors for Dummies
Peter Weverka

from: $4.99

Crushing it!
Crushing it!
Gary Vaynerchuk

from: $4.19

iPhone for Seniors for Dummies
iPhone for Seniors for Dummies
Nancy C. Muir

from: $5.19

Automotive Computer Network Repair: Diagnostic Strategies of Modern Automotive Systems
Automotive Computer Network Repair: Diagnostic Strategies of Modern Automotive Systems
Mandy Concepcion

from: $28.74

Vintage Laptop Computers: First Decade: 1980-89
Vintage Laptop Computers: First Decade: 1980-89
James E. Wilson

from: $14.54

iGen: Why Today’s Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
iGen: Why Today’s Super-Connected Kids Are Growing Up Less Rebellious, More Tolerant, Less Happy--and Completely Unprepared for Adulthood--and What That Means for the Rest of Us
Jean M. Twenge

from: $4.39

Pass SQL Exam 70-461 & Job Interview: Programming SQL Server 2012
Pass SQL Exam 70-461 & Job Interview: Programming SQL Server 2012
Kalman Toth

from: $29.95

A Digital Bundle: Protecting and Promoting Indigenous Knowledge Online
A Digital Bundle: Protecting and Promoting Indigenous Knowledge Online
Jennifer Wemigwans

from: $24.95

Ten Arguments for Deleting Your Social Media Accounts Right Now
Ten Arguments for Deleting Your Social Media Accounts Right Now
Jaron Lanier

from: $4.99

A Comprehensible Guide to Controller Area Network
A Comprehensible Guide to Controller Area Network
Wilfried Voss

from: $14.09

Practical VIM: Edit Text at the Speed of Thought
Practical VIM: Edit Text at the Speed of Thought
Drew Neil

from: $9.49

Book Overview

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises.

In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles.

The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Customer Reviews

0 customer rating | 0 review
There are currently no reviews. Be the first to review this work.
Copyright © 2025 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks ® and the ThriftBooks ® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured