Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.
Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Foundations of Cryptography presents a rigorous and systematic treatment of foundational issues, defining cryptographic tasks and solving cryptographic problems. The emphasis is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems, as opposed to describing ad-hoc approaches. This second volume contains a thorough treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols. It builds on the previous volume, which provided a treatment of one-way functions, pseudorandomness, and zero-knowledge proofs. It is suitable for use in a graduate course on cryptography and as a reference book for experts. The author assumes basic familiarity with the design and analysis of algorithms; some knowledge of complexity theory and probability is also useful.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"9311","item_name":"Everyday Cryptography: Fundamental Principles and Applications","item_brand":"Keith Martin","item_category":"Computing & Internet","list":"Product Page","price":"40.60","variant":"","quantity":1},{"item_id":"13018","item_name":"Post-Quantum Cryptography: Third International Workshop, PQCrypto 2010, Darmstadt, Germany, May 25-28, 2010, Proceedings - Security and Cryptology 6061","item_brand":"Nicolas Sendrier","item_category":"Computing & Internet","list":"Product Page","price":"31.49","variant":"","quantity":1},{"item_id":"9082","item_name":"Handbook of Applied Cryptography - Discrete Mathematics and Its Applications","item_brand":"Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone","item_category":"Computing & Internet","list":"Product Page","price":"88.39","variant":"","quantity":1},{"item_id":"9809","item_name":"Cryptography For Dummies","item_brand":"Chey Cobb","item_category":"Computing & Internet","list":"Product Page","price":"7.06","variant":"","quantity":1},{"item_id":"9973","item_name":"Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto","item_brand":"Roger A. Grimes","item_category":"Computing & Internet","list":"Product Page","price":"13.96","variant":"","quantity":1},{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1},{"item_id":"10959","item_name":"Cryptography InfoSec Pro Guide","item_brand":"Sean-Philip Oriyano","item_category":"Computing & Internet","list":"Product Page","price":"9.29","variant":"","quantity":1},{"item_id":"11795","item_name":"Practical Cryptography: Algorithms and Implementations Using C++","item_brand":"Saiful Azad, Al-Sakib Khan Pathan","item_category":"Computing & Internet","list":"Product Page","price":"71.76","variant":"","quantity":1}]