INTRODUCTION TO CRYPTOGRAPHY WITH MATHEMATICAL FOUNDATIONS AND COMPUTER IMPLEMENTATIONS

From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in crypto...

Full description

Saved in:
Bibliographic Details
Main Author: Stanoyevitch, Alexander (Author)
Format: Book
Language:English
Published: Boca Raton CRC Press 2011
Series:Discrete mathematics and its applications
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam#a2200000#i#4501
001 wils-423875
005 202241112566
008 220511t20112011FLU ag# ##001 ##eng#D
020 # # |a 9781439817636  |q hardback 
020 # # |a 1439817634  |q hardback 
040 # # |a DLC  |b eng  |c DLC  |d UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a QA268  |b .S693 2011 
100 1 # |a Stanoyevitch, Alexander  |e author 
245 1 0 |a INTRODUCTION TO CRYPTOGRAPHY  |b WITH MATHEMATICAL FOUNDATIONS AND COMPUTER IMPLEMENTATIONS  |c Alexander Stanoyevitch 
264 # 1 |a Boca Raton  |b CRC Press  |c 2011 
264 # 4 |c ©2011 
300 # # |a xix, 649 pages  |b illustrations  |c 26 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
490 1 # |a DISCRETE MATHEMATICS AND ITS APPLICATIONS 
500 # # |a "A chapman & hall book" 
504 # # |a Includes bibliographical references and index 
520 # # |a From the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography. 
650 # 0 |a Cryptography  |x Mathematics 
650 # 0 |a Coding theory  |x Data processing 
650 # 0 |a Cryptography  |x Data processing 
650 # 0 |a Data encryption (Computer science)  |x Mathematics 
830 # 0 |a Discrete mathematics and its applications 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=423875 
964 # # |c BOK  |d CS 
998 # # |a 00130##a006.2.2||00250##a002.5.2||00250##b002.5.3||00255##a007.25.3||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00500##a002.17.2||00502##a007.9.2||00520##a007.2||00520##b007.2||00538##a003.16.9||00546##a006.11||00730##a006.2.2||00730##d006.4||00730##f006.10||00730##n006.2.2||00730##p006.2.2||