000 03920cam a2200409 i 4500
999 _c69575
_d69575
001 18343476
003 FUTML
005 20181030133202.0
008 141022s2015 flua grb 001 0 eng
010 _a 2014039042
020 _a9781466570269 (HBK)
037 _aB-37300
040 _aFUTML
_beng
_cFUTML
_eAACR2
_dFUTML
042 _apcc
050 0 0 _aQA76.9.A25
_bK36 2015
100 1 _aKatz, Jonathan,
_d1974-
_930762
245 1 0 _aIntroduction to modern cryptography /
_cJonathan Katz, and Yehuda Lindell.-
_hPRINT RESOURCES
250 _aSecond edition.
260 _aBoca Raton :
_bCRC Press/Taylor & Francis,
_cC 2015.
300 _axx, 583 p. :
_billus.;
_c24 cm.
490 0 _aChapman & hall/crc cryptography and network security series
504 _aIncludes References and index.
520 _a"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study. "--
_cProvided by publisher.
590 _aB-37300/OCF/30/10/2018
650 0 _aComputer security.
_96556
650 0 _aCryptography.
_930763
650 7 _aCOMPUTERS / Operating Systems / General.
_930764
650 7 _aMATHEMATICS / Combinatorics.
_930765
700 1 _aLindell, Yehuda.
_930766
856 4 2 _3Cover image
_uhttp://images.tandf.co.uk/common/jackets/websmall/978146657/9781466570269.jpg
912 _aOGWO COMFORT
_bOGWO COMFORT
_cSABA
942 _2lcc
_cBKS
949 _aIBB LIBRARY GIDAN KWANO CAMPUS
_cQA76.9.A25
_d.K38
_g2342132431
_nnc 1