Skip to content
Register Sign in Wishlist

Cryptography and Secure Communication

$98.99 (P)

  • Date Published: May 2014
  • availability: In stock
  • format: Hardback
  • isbn: 9781107014275
Average user rating
(1 review)

$ 98.99 (P)
Hardback

Add to cart Add to wishlist

Other available formats:
eBook


Looking for an examination copy?

If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact collegesales@cambridge.org providing details of the course you are teaching.

Description
Product filter button
Description
Contents
Resources
Courses
About the Authors
  • Today's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new. Major branches of classical and modern cryptography are discussed in detail, from basic block and stream cyphers through to systems based on elliptic and hyperelliptic curves, accompanied by concise summaries of the necessary mathematical background. Practical aspects such as implementation, authentication and protocol-sharing are also covered, as are the possible pitfalls surrounding various cryptographic methods. Written specifically with engineers in mind, and providing a solid grounding in the relevant algorithms, protocols and techniques, this insightful introduction to the foundations of modern cryptography is ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.

    • Develops a goal-focused and direct approach to understanding modern cryptosystems without sacrificing depth
    • Written to be accessible to the general technically educated reader
    • Includes over 200 problems for solution
    Read more

    Customer reviews

    20th Jan 2015 by Sandyyy

    Its very informative for communication security point of view but costly of Indian currency

    Review was not posted due to profanity

    ×

    , create a review

    (If you're not , sign out)

    Please enter the right captcha value
    Please enter a star rating.
    Your review must be a minimum of 12 words.

    How do you rate this item?

    ×

    Product details

    • Date Published: May 2014
    • format: Hardback
    • isbn: 9781107014275
    • length: 602 pages
    • dimensions: 252 x 178 x 32 mm
    • weight: 1.33kg
    • contains: 77 b/w illus. 230 exercises
    • availability: In stock
  • Table of Contents

    1. Introduction
    2. The integers
    3. Cryptography based on the integer ring
    4. Cryptography based on the discrete logarithm
    5. Information-theoretic methods in cryptography
    6. Block ciphers
    7. Stream ciphers
    8. Authentication and ownership protection
    9. Groups, rings, and fields
    10. Cryptography based on elliptic curves
    11. Cryptography based on hyperelliptic curves
    12. Cryptography based on bilinear pairings
    13. Implementation
    14. Cryptographic protocols for security and identification
    15. More public-key cryptography.

  • Author

    Richard E. Blahut, University of Illinois, Urbana-Champaign
    Richard E. Blahut is the Henry Magnuski Professor of Electrical and Computer Engineering at the University of Illinois, Urbana-Champaign. He is a Fellow of the Institute of Electrical and Electronics Engineers and the recipient of many awards including the IEEE Alexander Graham Bell Medal (1998), the Tau Beta Pi Daniel C. Drucker Eminent Faculty Award, and the IEEE Millennium Medal. He was named a Fellow of IBM Corporation in 1980 (where he worked for over 30 years) and was elected to the US National Academy of Engineering in 1990.

Sign In

Please sign in to access your account

Cancel

Not already registered? Create an account now. ×

Sorry, this resource is locked

Please register or sign in to request access. If you are having problems accessing these resources please email lecturers@cambridge.org

Register Sign in
Please note that this file is password protected. You will be asked to input your password on the next screen.

» Proceed

You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.

Continue ×

Continue ×

Continue ×

Find content that relates to you

Join us online

This site uses cookies to improve your experience. Read more Close

Are you sure you want to delete your account?

This cannot be undone.

Cancel

Thank you for your feedback which will help us improve our service.

If you requested a response, we will make sure to get back to you shortly.

×
Please fill in the required fields in your feedback submission.
×