Cryptography : theory and practice / Douglas R. Stinson.
Tipo de material: TextoSeries Discrete mathematics and its applicationsDetalles de publicación: Boca Raton [etc.] : Chapman & Hall/CRC, cop. 2006. Edición: 3rd ed.Descripción: [6]h., 593 p. ; 24 cmISBN: 1584885084; 9781584885085Tema(s): Codificación, Teoría de la | CriptografíaResumen: This third edition of a standard text provides complete coverage of the use of cryptographic protocols which establish a series of steps that must be taken before any type of secret transmission can be completed. The book shows the reader how the various parties to the transaction establish their cryptographic identities or keys. It covers many of the cryptographic tools used in network security along with topic such as copyright protection techniques and public key infrastructure. The book is a text for senior graduate courses introducing cryptography and is also a useful reference for professionals interested in network security and cryptographic protocols.Resumen: Índice: Classical Cryptography. Shannon's Theory. Block Ciphers and the Advanced Encryption Standard. Cryptographic Hash Functions. The RSA Encryption Scheme and Factoring Integers. Public-Key Cryptosystems Based on the Discrete Logarithm Problem. SignatureSchemes. Further Reading. Bibliography. Cryptosystem Index. Algorithm Index. Problem Index. Index.Tipo de ítem | Biblioteca de origen | Signatura | URL | Estado | Fecha de vencimiento | Código de barras | Reserva de ítems | Bibliografía recomendada |
---|---|---|---|---|---|---|---|---|
Manuales | 02. BIBLIOTECA CAMPUS PUERTO REAL | 003.26/STI/cry (Navegar estantería(Abre debajo)) | Texto completo | Disponible Ubicación en estantería | Bibliomaps® | 3744669684 |
CÓDIGOS Y CRIPTOGRAFÍA GRADO EN MATEMATICAS Asignatura actualizada 2022-2023 |
||
Monografías | 02. BIBLIOTECA CAMPUS PUERTO REAL | 003.26/STI/cry (Navegar estantería(Abre debajo)) | Texto completo | Prestado | 31/01/2025 | 3743151085 |
Bibliografía e índice.
This third edition of a standard text provides complete coverage of the use of cryptographic protocols which establish a series of steps that must be taken before any type of secret transmission can be completed. The book shows the reader how the various parties to the transaction establish their cryptographic identities or keys. It covers many of the cryptographic tools used in network security along with topic such as copyright protection techniques and public key infrastructure. The book is a text for senior graduate courses introducing cryptography and is also a useful reference for professionals interested in network security and cryptographic protocols.
Índice: Classical Cryptography. Shannon's Theory. Block Ciphers and the Advanced Encryption Standard. Cryptographic Hash Functions. The RSA Encryption Scheme and Factoring Integers. Public-Key Cryptosystems Based on the Discrete Logarithm Problem. SignatureSchemes. Further Reading. Bibliography. Cryptosystem Index. Algorithm Index. Problem Index. Index.
No hay comentarios en este titulo.