Cryptography : Theory and Practice, 4/e (Hardcover)
Douglas Robert Stinson, Maura Paterson
- 出版商: CRC
- 出版日期: 2018-08-20
- 定價: $3,960
- 售價: 8.0 折 $3,168
- 語言: 英文
- 頁數: 598
- 裝訂: Hardcover
- ISBN: 1138197017
- ISBN-13: 9781138197015
-
相關分類:
資訊安全
-
其他版本:
Cryptography: Theory and Practice 4th Edition
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$1,350$1,323 -
$940$700 -
$2,650$2,518 -
$1,615Cracking the Coding Interview : 189 Programming Questions and Solutions, 6/e (Paperback)
-
$780$616 -
$403Zabbix 監控系統深度實踐, 2/e
-
$550$468 -
$780$663 -
$1,480Serious Cryptography: A Practical Introduction to Modern Encryption (Paperback)
-
$500$390 -
$580$458 -
$580$452 -
$690$538 -
$1,050Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
-
$3,450$3,278 -
$3,450$3,278 -
$709Zabbix 企業級分佈式監控系統, 2/e
-
$880$748 -
$680$578 -
$505Prometheus 監控技術與實踐
-
$2,680$2,546 -
$294$279 -
$648$616 -
$420$357 -
$607現代密碼學及其應用
相關主題
商品描述
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.
The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition:
- New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
- New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
- New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
- An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
- Interesting attacks on cryptosystems, including:
- padding oracle attack
- correlation attacks and algebraic attacks on stream ciphers
- attack on the DUAL-EC random bit generator that makes use of a trapdoor.
- A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
- Methods of key distribution in sensor networks.
- The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
- The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
- The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
商品描述(中文翻譯)
《密碼學:理論與實踐》已經推出三個版本,受到教師和學生的廣泛歡迎。該書提供了該主題基礎的全面入門,同時介紹了密碼學的最新進展。
作者們全面深入地介紹了對於保護世界各地無窮無盡且不斷增加的信息所必不可少的方法和協議。
第四版的主要特點包括:
- 新增了一章關於令人興奮的新興領域後量子密碼學(第9章)。
- 新增了一個高層次的非技術性概述,介紹了密碼學的目標和工具(第1章)。
- 新增了一個數學附錄,概述了數論和代數的定義和主要結果(附錄A)。
- 對流密碼的處理進行了擴展,包括常見的設計技術以及對Trivium的介紹。
- 介紹了對密碼系統的有趣攻擊,包括:
- 填充預測攻擊
- 流密碼的相關攻擊和代數攻擊
- 利用陷阱的DUAL-EC隨機位生成器的攻擊。
- 介紹了海綿構造在哈希函數中的應用,以及其在新的SHA-3哈希標準中的使用。
- 介紹了在感測器網絡中的密鑰分發方法。
- 介紹了視覺密碼學的基礎,允許將秘密視覺信息分割成多個片段(份額),以便稍後組合恢復秘密。
- 介紹了比特幣和區塊鏈中使用的基本加密貨幣技術。
- 介紹了在信使協議(如Signal)中使用的新方法的基礎,包括可否否認性和Diffie-Hellman金鑰協議。