Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.

Saved in:
Bibliographic Details
Main Authors: Tilborg, Henk C. A. van. author., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Boston, MA : Springer US, 2002
Subjects:Computer science., Computer communication systems., Data structures (Computer science)., Data encryption (Computer science)., Coding theory., Computer science, Computer Science., Data Encryption., Data Structures, Cryptology and Information Theory., Coding and Information Theory., Discrete Mathematics in Computer Science., Computer Communication Networks.,
Online Access:http://dx.doi.org/10.1007/b116810
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:200923
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer science
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer science
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
spellingShingle Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer science
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer science
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Tilborg, Henk C. A. van. author.
SpringerLink (Online service)
Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /
description The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.
format Texto
topic_facet Computer science.
Computer communication systems.
Data structures (Computer science).
Data encryption (Computer science).
Coding theory.
Computer science
Computer Science.
Data Encryption.
Data Structures, Cryptology and Information Theory.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
author Tilborg, Henk C. A. van. author.
SpringerLink (Online service)
author_facet Tilborg, Henk C. A. van. author.
SpringerLink (Online service)
author_sort Tilborg, Henk C. A. van. author.
title Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /
title_short Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /
title_full Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /
title_fullStr Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /
title_full_unstemmed Fundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial /
title_sort fundamentals of cryptology [electronic resource] : a professional reference and interactive tutorial /
publisher Boston, MA : Springer US,
publishDate 2002
url http://dx.doi.org/10.1007/b116810
work_keys_str_mv AT tilborghenkcavanauthor fundamentalsofcryptologyelectronicresourceaprofessionalreferenceandinteractivetutorial
AT springerlinkonlineservice fundamentalsofcryptologyelectronicresourceaprofessionalreferenceandinteractivetutorial
_version_ 1756267493682315264
spelling KOHA-OAI-TEST:2009232018-07-30T23:27:56ZFundamentals of Cryptology [electronic resource] : A Professional Reference and Interactive Tutorial / Tilborg, Henk C. A. van. author. SpringerLink (Online service) textBoston, MA : Springer US,2002.engThe protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.Classical Cryptosystems -- Shift Register Sequences -- Block Ciphers -- Shannon Theory -- Data Compression Techniques -- Public-Key Cryptography -- Discrete Logarithm Based Systems -- RSA Based Systems -- Elliptic Curves Based Systems -- Coding Theory Based Systems -- Knapsack Based Systems -- Hash Codes & Authentication Techniques -- Zero Knowledge Protocols -- Secret Sharing Systems.The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.Computer science.Computer communication systems.Data structures (Computer science).Data encryption (Computer science).Coding theory.Computer scienceComputer Science.Data Encryption.Data Structures, Cryptology and Information Theory.Coding and Information Theory.Discrete Mathematics in Computer Science.Computer Communication Networks.Springer eBookshttp://dx.doi.org/10.1007/b116810URN:ISBN:9780306470530