Breaking News!
Up to 30% Off Nike Footwear

Introduction to Cryptography with Maple

Best Price (Coupon Required):
Buy Introduction to Cryptography with Maple for $36.00 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $39.99 - $39.99
BEST PRICE

Single Product Purchase

$36.00
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$39.99 $39.99

10% OFF
This deals requires coupon
$36.00
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783642321665
Condition
New
Product Description

This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size. A distinctive feature of the author's approach is the use of Maple as a programming environment in which not just the cryptographic primitives but also the most important cryptographic schemes are implemented following the recommendations of standards bodies such as NIST, with many of the known cryptanalytic attacks implemented as well. The purpose of the Maple implementations is to let the reader experiment and learn, and for this reason the author includes numerous examples. The book discusses important recent subjects such as homomorphic encryption, identity-based cryptography and elliptic curve cryptography. The algorithms and schemes which are treated in detail and implemented in Maple include AES and modes of operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin, Elgamal, Paillier, Cocks IBE, DSA and ECDSA. In addition, some recently introduced schemes enjoying strong security properties, such as RSA-OAEP, Rabin-SAEP, Cramer--Shoup, and PSS, are also discussed and implemented. On the cryptanalysis side, Maple implementations and examples are used to discuss many important algorithms, including birthday and man-in-the-middle attacks, integer factorization algorithms such as Pollard's rho and the quadratic sieve, and discrete log algorithms such as baby-step giant-step, Pollard's rho, Pohlig--Hellman and the index calculus method. This textbookis suitable for advanced undergraduate and graduate students of computer science, engineering and mathematics, satisfying the requirements of various types of courses: a basic introductory course; a theoretically oriented course whose focus is on the precise definition of security concepts and on cryptographic schemes with reductionist security proofs; a practice-oriented course requiring little mathematical background and with an emphasis on applications; or a mathematically advanced course addressed to students with a stronger mathematical background. The main prerequisite is a basic knowledge of linear algebra and elementary calculus, and while some knowledge of probability and abstract algebra would be helpful, it is not essential because the book includes the necessary background from these subjects and, furthermore, explores the number-theoretic material in detail. The book is also a comprehensive reference and is suitable for self-study by practitioners and programmers.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Einfhrung in die Verbandstheorie

Einfhrung in die Verbandstheorie

$54.99
Combinatorial Functors

Combinatorial Functors

$54.99
Histamine Receptors as Drug Targets

Histamine Receptors as Drug Targets

$169.99
Frequency Selective Surfaces based High Performance Microstrip Antenna

Frequency Selective Surfaces based High Performance Microstrip Antenna

$54.99
Creating Brain-Like Intelligence

Creating Brain-Like Intelligence

$84.99
Carcinogenesis: Fundamental Mechanisms and Environmental Effects

Carcinogenesis: Fundamental Mechanisms and Environmental Effects

$219.99
Experimental Film and Photochemical Practices

Experimental Film and Photochemical Practices

$24.99
Rntgenphysik

Rntgenphysik

$59.99
The Right Ventricle in Adults with Tetralogy of Fallot

The Right Ventricle in Adults with Tetralogy of Fallot

$39.99
Globalizing the Community College

Globalizing the Community College

$54.99
Dugout: The Zombie Steals Home (Hardcover)

Dugout: The Zombie Steals Home (Hardcover)

$18.74
North Sea Climate

North Sea Climate

$39.99
The Unprecedented American Presidency

The Unprecedented American Presidency

$39.99
The Ecological Basis of Conservation

The Ecological Basis of Conservation

$169.99
iPhone for Work

iPhone for Work

$19.99
Ergebnisse der Allgemeinen Pathologie und Pathologischen Anatomie des Menschen und der Tiere

Ergebnisse der Allgemeinen Pathologie und Pathologischen Anatomie des Menschen und der Tiere

$59.99
Electromagnetic Compatibility Handbook

Electromagnetic Compatibility Handbook

$39.99
Theory and Design Methods of Special Space Orbits

Theory and Design Methods of Special Space Orbits

$129.00
Prozeorientierte Unternehmensorganisation

Prozeorientierte Unternehmensorganisation

$44.99
Applying and Interpreting Statistics

Applying and Interpreting Statistics

$54.99
From Metaphysics to Rhetoric

From Metaphysics to Rhetoric

$109.99
Justice to Future Generations and the Environment

Justice to Future Generations and the Environment

$109.99
The Bush Presidency

The Bush Presidency

$84.99
EAI International Conference on Technology, Innovation, Entrepreneurship and Education

EAI International Conference on Technology, Innovation, Entrepreneurship and Education

$129.00
Einfhrung in die Zeitreihenanalyse

Einfhrung in die Zeitreihenanalyse

$39.99
Foundations of Software Technology and Theoretical Computer Science

Foundations of Software Technology and Theoretical Computer Science

$39.99
Neuronale Netze im Portfolio-Management

Neuronale Netze im Portfolio-Management

$59.99
Membrane Computing

Membrane Computing

$54.99
Beitrge zur Wohlfahrtskonomie

Beitrge zur Wohlfahrtskonomie

$64.99
Fundamental Approaches to Software Engineering

Fundamental Approaches to Software Engineering

$54.99
Cultural Representations of Gender Vulnerability and Resistance

Cultural Representations of Gender Vulnerability and Resistance

$59.99
A Phenomenological Knock Model for the Development of Future Engine Concepts

A Phenomenological Knock Model for the Development of Future Engine Concepts

$54.99
Understanding Chinese Engineering Doctoral Students in U.S. Institutions

Understanding Chinese Engineering Doctoral Students in U.S. Institutions

$54.99
Globale Kommunikationsnetze

Globale Kommunikationsnetze

$39.99
Markov's Theorem and 100 Years of the Uniqueness Conjecture

Markov's Theorem and 100 Years of the Uniqueness Conjecture

$119.00
Ubiquitous Information Technologies and Applications

Ubiquitous Information Technologies and Applications

$219.99
Analysis and Visualization of Citation Networks

Analysis and Visualization of Citation Networks

$49.99
Proceedings of the 6th China Aeronautical Science and Technology Conference

Proceedings of the 6th China Aeronautical Science and Technology Conference

$249.99
Sports Cardiology

Sports Cardiology

$169.00
New Takes in Film-Philosophy

New Takes in Film-Philosophy

$54.99
previous
next