Modern cryptography : theory and practice / Wenbo Mao.
By: Mao, Wenbo.
Material type: BookPublisher: Upper Saddle River, NJ : Prentice Hall PTR, c2004Description: xxxviii, 707 p. : ill. ; 24 cm.ISBN: 0130669431; 9780130669438; 813170212X.Subject(s): Cryptography | Computers -- Access control | Data transmission systems -- Security measuresDDC classification: 005.82Item type | Current location | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
Books | Central Library, KUET General Stacks | 005.82 MAO (Browse shelf) | 1 | Available | 3010044036 |
Browsing Central Library, KUET Shelves , Shelving location: General Stacks Close shelf browser
005.8 STA Network security essentials : | 005.8 STA Network security essentials : | 005.803 TUL Microsoft encyclopedia of security / | 005.82 MAO Modern cryptography : | 005.82 MAR Cryptography : | 005.82 MEN Handbook of applied cryptography / | 005.82 MEN Handbook of applied cryptography / |
Includes bibliographical references (p. 673-698) and index.
I. Introduction -- 1. Beginning with a Simple Communication Game -- 2. Wrestling Between Safeguard and Attack -- II. Mathematical Foundations -- Standard Notation -- 3. Probability and Information Theory -- 4. Computational Complexity -- 5. Algebraic Foundations -- 6. Number Theory -- III. Basic Cryptographic Techniques -- 7. Encryption - Symmetric Techniques -- 8. Encryption - Asymmetric Techniques -- 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions -- 10. Data Integrity Techniques -- IV. Authentication -- 11. Authentication Protocols - Principles -- 12. Authentication Protocols - The Real World -- 13. Authentication Framework for Public-Key Cryptography -- V. Formal Approaches to Security Establishment -- 14. Formal and Strong Security Definitions for Public-Key Cryptosystems -- 15. Provably Secure and Efficient Public-Key Cryptosystems -- 16. Strong and Provable Security for Digital Signatures -- 17. Formal Methods for Authentication Protocols Analysis -- VI. Cryptographic Protocols -- 18. Zero-Knowledge Protocols -- 19. Returning to "Coin Flipping Over Telephone" -- 20. Afterremark.
There are no comments for this item.