MOMENTAN AUSVERKAUFT

Chapman and Hall/Crc Cryptography and Network Security Ser.: Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell (2020, Hardcover)

Über dieses Produkt

Product Identifiers

PublisherCRC Press LLC
ISBN-100815354363
ISBN-139780815354369
eBay Product ID (ePID)240562049

Product Key Features

Number of Pages648 Pages
LanguageEnglish
Publication NameIntroduction to Modern Cryptography
Publication Year2020
SubjectOperating Systems / General, Security / Cryptography, Security / General, General
FeaturesNew Edition
TypeTextbook
Subject AreaMathematics, Computers
AuthorJonathan Katz, Yehuda Lindell
SeriesChapman and Hall/Crc Cryptography and Network Security Ser.
FormatHardcover

Dimensions

Item Weight39 Oz
Item Length9.2 in
Item Width6.1 in

Additional Product Features

Edition Number3
Intended AudienceCollege Audience
Dewey Edition23/eng/20250110
ReviewsThe organization is quite natural, and aligns well with my course. My course covers the topics in exactly the same order as in Katz and Lindell, except that we skip some sections due to time constraints. I actually find Chapter 1 (Introduction) among the strongest aspects of this book. It does an excellent job discussing historical cryptography, explaining the motivation behind "modern cryptography," and introducing the non-expert to some of the basic concepts on which the rest of the contents of the book are built. I think this is an excellent textbook, and I can find very little fault with it. As I mentioned above, a possible suggestion is to add some more modern topics (lattice crypto, code-based crypto, FHE, obfuscation etc.) On the other hand, as an introductory textbook, it is perhaps also fine without those more advanced and more modern topics. - Gorjan Alagic I find Chapters 2 and 5 to be the best. Both for its clarity. Chapter 2 is clear on certain details that, in my view, make the material much easier to understand than other treatments I have come across. E.g., clearly clarifying that when we consider the notion of "secret," we address the case only that one single message is sent. Not multiple messages. This really helps one quickly understand the technical details and proofs. Similarly, Chapter 5 on hash functions, in my view, is tricky to present. E.g., it must be clear that one is not dealing with a particular instance of a collision, but really finding collisions. This distinction is made very clearly in this book.- Mahesh Tripunitara
IllustratedYes
Dewey Decimal005.8/24
Edition DescriptionNew Edition
Table Of Content1. Introduction. 2. Perfectly Secret Encryption. 3. Private-Key Encryption. 4. Message Authentication Codes. 5. CCA-Security and Authenticated Encryption. 6. Hash Functions and Applications. 7. Practical Constructions of Symmetric-Key Primitives. 8. *Theoretical Constructions of Symmetric-Key Primitives. 9. Number Theory and Cryptographic Hardness Assumptions. 10. *Algorithms for Factoring and Computing Discrete Logarithms. 11. Key Management and the Public-Key Revolution. 12. Public-Key Encryption. 13. Digital Signature Schemes. 14. *Post-Quantum Cryptography. 15. *Advanced Topics in Public-Key Encryption.
SynopsisNow the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal definitions, rigorous proofs of security., Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography. The second half covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), and adds coverage of post-quantum cryptograpy to this edition.
LC Classification NumberQA76.9.A25K36 2020