Vous en avez un à vendre?

Introduction à la cryptographie avec théorie du codage par Wade Trappe : d'occasion

Dernier exemplaire disponible
État :
Bon
Le dernier / 2 vendus
Prix :
64,37 $US
Environ88,25 $C
Ayez l'esprit tranquille. Renvois acceptés.
Expédition :
Sans frais Standard Shipping. En savoir plussur l'expédition
Lieu : Sparks, Nevada, États-Unis
Livraison :
Livraison prévue entre le mar. 4 juin et le sam. 8 juin à 43230
Le délai de livraison est estimé en utilisant notre méthode exclusive, basée sur la proximité de l'acheteur du lieu où se trouve l'objet, le service d'expédition sélectionné, l'historique d'expédition du vendeur et d'autres facteurs. Les délais de livraison peuvent varier, particulièrement lors de périodes achalandées.
Renvois :
Renvoi sous 30jours. L'acheteur paie les frais de port du renvoi. En savoir plus- pour en savoir plus sur les renvois
Paiements :
     

Magasinez en toute confiance

Garantie de remboursement eBay
Recevez l'objet commandé ou obtenez un remboursement. 

Informations sur le vendeur

Inscrit comme vendeur professionnel
Le vendeur assume l'entière responsabilité de cette annonce.
Numéro de l'objet eBay :364121454775
Dernière mise à jour : mai 30, 2024 16:45:42 HAEAfficher toutes les modificationsAfficher toutes les modifications

Caractéristiques de l'objet

État
Bon: Un livre qui a été lu, mais qui est en bon état. La couverture présente des dommages infimes, ...
Book Title
Introduction to Cryptography with Coding Theory
Publication Date
2005-07-01
Edition Number
2
Pages
600
ISBN
0131862391
Publication Year
2005
Type
Textbook
Format
Hardcover
Language
English
Publication Name
Introduction to Cryptography with Coding Theory
Item Height
1.5in
Author
Wade Trappe, Lawrence Washington
Item Length
9.6in
Publisher
Pearson Education
Item Width
7.4in
Item Weight
38.6 Oz
Number of Pages
600 Pages

À propos de ce produit

Product Information

With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography.

Product Identifiers

Publisher
Pearson Education
ISBN-10
0131862391
ISBN-13
9780131862395
eBay Product ID (ePID)
45882293

Product Key Features

Author
Wade Trappe, Lawrence Washington
Publication Name
Introduction to Cryptography with Coding Theory
Format
Hardcover
Language
English
Publication Year
2005
Type
Textbook
Number of Pages
600 Pages

Dimensions

Item Length
9.6in
Item Height
1.5in
Item Width
7.4in
Item Weight
38.6 Oz

Additional Product Features

Lc Classification Number
Qa268.T73 2005
Edition Number
2
Table of Content
1 Overview Secure Communications. Cryptographic Applications 2 Classical Cryptosystems. Shift Ciphers. Affine Ciphers. The Vigen'ere Cipher. Substitution Ciphers. Sherlock Holmes. The Playfair and ADFGX Ciphers. Block Ciphers. Binary Numbers and ASCII. One-Time Pads. Pseudo-random Bit Generation. LFSR Sequences. Enigma. Exercises. Computer Problems. 3 Basic Number Theory. Basic Notions. Solving ax + by = d. Congruences. The Chinese Remainder Theorem. Modular Exponentiation. Fermat and Euler. Primitive Roots. Inverting Matrices Mod n. Square Roots Mod n. Legendre and Jacobi Symbols. Finite Fields. Continued Fractions. Exercises. Computer Problems. 4 The Data Encryption Standard Introduction. A Simplified DES-Type Algorithm. Differential Cryptanalysis. DES. Modes of Operation. Breaking DES. Meet-in-the-Middle Attacks. Password Security. Exercises. 5 AES: Rijndael The Basic Algorithm. The Layers. Decryption. Design Considerations. 6 The RSA Algorithm The RSA Algorithm. Attacks on RSA. Primality Testing. Factoring. The RSA Challenge. An Application to Treaty Verification. The Public Key Concept. Exercises. Computer Problems 7 Discrete Logarithms Discrete Logarithms. Computing Discrete Logs. Bit Commitment Diffie-Hellman Key Exchange. ElGamal Public Key Cryptosystems. Exercises. Computer Problems. 8 Hash Functions Hash Functions. A Simple Hash Example. The Secure Hash Algorithm. Birthday Attacks. Multicollisions. The Random Oracle Model. Using Hash Functions to Encrypt. 9 Digital Signatures RSA Signatures. The ElGamal Signature Scheme. Hashing and Signing. Birthday Attacks on Signatures. The Digital Signature Algorithm. Exercises. Computer Problems. 10 Security Protocols Intruders-in-the-Middle and Impostors. Key Distribution. Kerberos Public Key Infrastructures (PKI). X.509 Certificates. Pretty Good Privacy. SSL and TLS. Secure Electronic Transaction. Exercises. 11 Digital Cash Digital Cash. Exercises. 12 Secret Sharing Schemes Secret Splitting. Threshold Schemes. Exercises. Computer Problems. 13 Games Flipping Coins over the Telephone. Poker over the Telephone. Exercises. 14 Zero-Knowledge Techniques The Basic Setup. The Feige-Fiat-Shamir Identification Scheme. Exercises. 15 Information Theory Probability Review. Entropy. Huffman Codes. Perfect Secrecy. The Entropy of English. Exercises. 16 Elliptic Curves The Addition Law. Elliptic Curves Mod n. Factoring with Elliptic Curves. Elliptic Curves in Characteristic 2. Elliptic Curve Cryptosystems. Identity-Based Encryption. Exercises. Computer Problems. 17 Lattice Methods Lattices. Lattice Reduction. An Attack on RSA. NTRU. Exercises 18 Error Correcting Codes Introduction. Error Correcting Codes. Bounds on General Codes. Linear Codes. Hamming Codes. Golay Codes. Cyclic Codes. BCH Codes. Reed-Solomon Codes. The McEliece Cryptosystem. Other Topics. Exercises. Computer Problems. 19 Quantum Techniques in Cryptography A Quantum Experiment. Quantum Key Distribution. Shor's Algorithm. 4 Exercises. Mathematica Examples Maple Examples MATLAB Examples Further Reading Bibliography Index
Copyright Date
2006
Topic
Communication Studies, General, Security / Networking
Lccn
2005-048930
Dewey Decimal
005.82
Intended Audience
College Audience
Dewey Edition
22
Illustrated
Yes
Genre
Computers, Mathematics, Language Arts & Disciplines

Description de l'objet du vendeur

AlibrisBooks

AlibrisBooks

98,5% d'évaluations positives
1,8M objets vendus
Visiter la BoutiqueContacter

Évaluations détaillées du vendeur

Moyenne au cours des 12 derniers mois

Qualité de la description
4.9
Justesse des frais d'expédition
4.9
Rapidité de l'expédition
4.9
Communication
4.9

Évaluations comme vendeur (460 582)

c***c (57)- Évaluation laissée par l'acheteur.
Dernier mois
Achat vérifié
Excellent book
Afficher toutes les évaluations

Évaluations et avis sur le produit

4.2
4 évaluations du produit
  • 3 utilisateurs ont attribué une note de 5 étoiles sur 5
  • 0 utilisateurs ont attribué une note de 4 étoiles sur 5
  • 0 utilisateurs ont attribué une note de 3 étoiles sur 5
  • 1 utilisateurs ont attribué une note de 2 étoiles sur 5
  • 0 utilisateurs ont attribué une note de 1 étoiles sur 5

Would recommend

Good value

Compelling content

Avis les plus pertinents

  • Buy this if you must, but consider getting better books

    I hated everything about this book. I only bought it because it was a requirement from the college. The book is poorly written with poor examples and a scatterbrain approach to the learning curve. The author jumps from chapter to chapter giving examples from future chapters that leave you more confused than when you began reading. This is NOT the book for the crypto beginner. To effectively use this book, start at the last chapter and read backwards only after having obtained your White House crypto security certification. Then and only then will you make sense of it. 'Nuff said.

  • Amazing book on cryptology

    The book is well constructed, and even better taught (by prof. washington). It includes many great problems and is very comprehensive. I'm am thoroughly enjoying the course using this book.