Compare Prices | Create Shopping Lists with Price Drop Alerts | Set Coupons, Promo Codes & Sales Alerts | Get Access to Exclusive Deals and Much More... All in One Place | Read all about it here

Introduction to Cryptography with Maple

Introduction to Cryptography with Maple

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783642321665
Condition
New
Product Description

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size. A distinctive feature of the author's approach is the use of Maple as a programming environment in which not just the cryptographic primitives but also the most important cryptographic schemes are implemented following the recommendations of standards bodies such as NIST, with many of the known cryptanalytic attacks implemented as well. The purpose of the Maple implementations is to let the reader experiment and learn, and for this reason the author includes numerous examples. The book discusses important recent subjects such as homomorphic encryption, identity-based cryptography and elliptic curve cryptography. The algorithms and schemes which are treated in detail and implemented in Maple include AES and modes of operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin, Elgamal, Paillier, Cocks IBE, DSA and ECDSA. In addition, some recently introduced schemes enjoying strong security properties, such as RSA-OAEP, Rabin-SAEP, Cramer--Shoup, and PSS, are also discussed and implemented. On the cryptanalysis side, Maple implementations and examples are used to discuss many important algorithms, including birthday and man-in-the-middle attacks, integer factorization algorithms such as Pollard's rho and the quadratic sieve, and discrete log algorithms such as baby-step giant-step, Pollard's rho, Pohlig--Hellman and the index calculus method. This textbookis suitable for advanced undergraduate and graduate students of computer science, engineering and mathematics, satisfying the requirements of various types of courses: a basic introductory course; a theoretically oriented course whose focus is on the precise definition of security concepts and on cryptographic schemes with reductionist security proofs; a practice-oriented course requiring little mathematical background and with an emphasis on applications; or a mathematically advanced course addressed to students with a stronger mathematical background. The main prerequisite is a basic knowledge of linear algebra and elementary calculus, and while some knowledge of probability and abstract algebra would be helpful, it is not essential because the book includes the necessary background from these subjects and, furthermore, explores the number-theoretic material in detail. The book is also a comprehensive reference and is suitable for self-study by practitioners and programmers.

Available Colors
Available Sizes
1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$39.99
@ Link.springer.com     BUY Now

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
Contact Store Call Store Contact Support
$39.99 $39.99

$39.99
See Site In stock Visit Store

Similar Products

Multi-Agent-Based Simulation XXIII

$44.99

Optical Absorption Spectra Calculated Using Linear-Scaling Density-Functional Theory

$109.99

Lexis in Demography

$54.99

Ukraine: Perestroika to Independence

$24.99

Der Schizophrene Patient in der rztlichen Sprechstunde

$59.99

Advanced Techniques in Knowledge Discovery and Data Mining

$109.99

Simone Weil, Beyond Ideology?

$129.99

Applications and Innovations in Intelligent Systems XIV

$129.00

Sustainable Development of Sea-Corridors and Coastal Waters

$109.99

EEG in der Neuropdiatrie

$19.99

Kurzlehrbuch Psychiatrie

$29.99

Lateral Power Transistors in Integrated Circuits

$109.99

iOS Development at Scale

$39.99

Motor Activity and Movement Disorders

$129.00

An Introduction to the History of Economic Thought in Central Europe

$109.99

Energy Poverty and Access Challenges in Sub-Saharan Africa

$99.99

Bioprocesses and Engineering

$84.99

Property, Education and Identity in Late Eighteenth-Century Fiction

$54.99

Diseases of Mites and Ticks

$129.00

Fortschritte in der lokalen antimykotischen Therapie

$69.99

Computer Vision for Driver Assistance

$109.00

Enterprise Interoperability V

$169.99

Wavelets and Signal Processing

$39.99

2001 Mars Odyssey

$39.99

Modeling with Digital Ocean and Digital Coast

$84.99

Rational Choice and Social Welfare

$84.99

The Beginnings of University English

$54.99

Teacher Evaluation Around the World

$159.99

Advances in Mechanical Design

$379.99

Public Sector Financial Management for Sustainability and SDGs in Europe

$54.99

Multilingual Dictionary of Agronomic Plants

$169.99

Knstliche Intelligenz verstehen

$54.99

Heavy-Duty-, On- und Off-Highway-Motoren 2021

$139.99

Internet of Things

$199.99

Water Policy in Pakistan

$129.00

The Birth of a Queen

$109.00

Probability and Statistical Models in Operations Research, Computer and Management Sciences

$149.00

Modes of Esports Engagement in Overwatch

$59.99

Gender, Sprache, Kognition

$89.99

Theory and Concepts of English for Academic Purposes

$109.99