LEADER 04811nam 22007695 450 001 9910437604503321 005 20200706205923.0 010 $a3-642-41386-2 024 7 $a10.1007/978-3-642-41386-5 035 $a(CKB)3710000000031284 035 $a(EBL)1591873 035 $a(SSID)ssj0001066838 035 $a(PQKBManifestationID)11580006 035 $a(PQKBTitleCode)TC0001066838 035 $a(PQKBWorkID)11084859 035 $a(PQKB)11049978 035 $a(DE-He213)978-3-642-41386-5 035 $a(MiAaPQ)EBC1591873 035 $a(Au-PeEL)EBL1591873 035 $a(CaPaEBR)ebr10969070 035 $a(OCoLC)868040839 035 $a(PPN)176116206 035 $a(EXLCZ)993710000000031284 100 $a20131119d2013 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aModern Cryptography Primer$b[electronic resource] $eTheoretical Foundations and Practical Applications /$fby Czes?aw Ko?cielny, Miros?aw Kurkowski, Marian Srebrny 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (246 p.) 300 $aDescription based upon print version of record. 311 $a3-642-41385-4 327 $aChap. 1 Basic Concepts and Historical Overview -- Chap. 2 Mathematical Foundations of Cryptography -- Chap. 3 Foundations of Symmetric Cryptography -- Chap. 4 Foundations of Asymmetric Cryptography -- Chap. 5 An Electronic Signature and Hash Functions -- Chap. 6 PGP Systems and True Crypt -- Chap. 7 Public Key Infrastructure -- Chap. 8 Cryptographic Protocols -- Chap. 9 Cryptography Application for Data Security -- References -- Index. 330 $aCryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.  After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key infrastructures, cryptographic protocols, and applications in network security. In each case the text presents the key technologies, algorithms, and protocols, along with methods of design and analysis, while the content is characterized by a visual style and all algorithms are presented in readable pseudocode or using simple graphics and diagrams. The book is suitable for undergraduate and graduate courses in computer science and engineering, particularly in the area of networking, and it is also a suitable reference text for self-study by practitioners and researchers. The authors assume only basic elementary mathematical experience, the text covers the foundational mathematics and computational complexity theory. 606 $aData structures (Computer science) 606 $aComputer security 606 $aE-commerce 606 $aComputer organization 606 $aData Structures and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15009 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 606 $aComputer Systems Organization and Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13006 615 0$aData structures (Computer science). 615 0$aComputer security. 615 0$aE-commerce. 615 0$aComputer organization. 615 14$aData Structures and Information Theory. 615 24$aSystems and Data Security. 615 24$ae-Commerce/e-business. 615 24$aComputer Systems Organization and Communication Networks. 676 $a004 676 $a004.6 676 $a005.74 676 $a005.8 700 $aKo?cielny$b Czes?aw$4aut$4http://id.loc.gov/vocabulary/relators/aut$01059062 702 $aKurkowski$b Miros?aw$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aSrebrny$b Marian$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910437604503321 996 $aModern Cryptography Primer$92504030 997 $aUNINA