暗号学(テキスト・第4版)<br>Cryptography : Theory and Practice, Fourth Edition (Chapman & Hall/crc Cryptography and Network Security Series) (4TH)

個数:

暗号学(テキスト・第4版)
Cryptography : Theory and Practice, Fourth Edition (Chapman & Hall/crc Cryptography and Network Security Series) (4TH)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 598 p.
  • 言語 ENG
  • 商品コード 9781138197015
  • DDC分類 005.82

Full Description

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography.

The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.

Key Features of the Fourth Edition:




New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).



New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).



New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).



An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.



Interesting attacks on cryptosystems, including:




padding oracle attack



correlation attacks and algebraic attacks on stream ciphers



attack on the DUAL-EC random bit generator that makes use of a trapdoor.




A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.



Methods of key distribution in sensor networks.



The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.



The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.



The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.

Contents

Introduction to Cryptography. Classical Cryptography. Shannon's Theory, Perfect Secrecy and the One-Time Pad. Block Ciphers and Stream Ciphers. Hash Functions and Message Authentication. The RSA Cryptosystem and Factoring Integers. Public-Key Cryptography and Discrete Logarithms. Post-quantum Cryptography. Identification Schemes and Entity Authentication. Key Distribution. Key Agreement Schemes. Miscellaneous Topics. Appendix A: Number Theory and Algebraic Concepts for Cryptography, Appendix B: Pseudorandom Bit Generation for Cryptography.

最近チェックした商品