A Classical Introduction to Cryptography: Applications for Communications

CollectorBonanza
(5218)
Venditore professionale
Registrato come venditore professionale
US $84,99
CircaEUR 73,32
o Proposta d'acquisto
Condizione:
Buone condizioni
Goditi i vantaggi. Spedizione e restituzioni gratuite.
Spedizione:
Gratis USPS Media MailTM.
Oggetto che si trova a: Tampa, Florida, Stati Uniti
Consegna:
Consegna prevista tra il ven 21 nov e il mar 25 nov a 94104
I tempi di consegna previsti utilizzando il metodo proprietario di eBay, che è basato sulla vicinanza dell'acquirente rispetto al luogo in cui si trova l'oggetto, sul servizio di spedizione selezionato, sulla cronologia di spedizione del venditore e su altri fattori. I tempi di consegna possono variare, specialmente durante le festività.
Restituzioni:
Restituzioni entro 30 giorni. Le spese di spedizione del reso sono a carico del venditore.
Pagamenti:
    Diners Club

Fai shopping in tutta sicurezza

Garanzia cliente eBay
Se non ricevi l'oggetto che hai ordinato, riceverai il rimborso. Scopri di piùGaranzia cliente eBay - viene aperta una nuova finestra o scheda
Il venditore si assume la piena responsabilità della messa in vendita dell'oggetto.
Numero oggetto eBay:336262918086

Specifiche dell'oggetto

Condizione
Buone condizioni: Libro che è già stato letto ma è in buone condizioni. Mostra piccolissimi danni ...
Book Title
A Classical Introduction to Cryptography
ISBN-13
9781441937971
ISBN
9781441937971
Categoria

Informazioni su questo prodotto

Product Identifiers

Publisher
Springer
ISBN-10
1441937978
ISBN-13
9781441937971
eBay Product ID (ePID)
108993484

Product Key Features

Number of Pages
Xviii, 336 Pages
Publication Name
Classical Introduction to Cryptography : Applications for Communications Security
Language
English
Publication Year
2010
Subject
Information Theory, Communication Studies, Security / Cryptography, Security / General, Databases / General
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Author
Serge Vaudenay
Format
Trade Paperback

Dimensions

Item Weight
19.2 Oz
Item Length
9.3 in
Item Width
6.1 in

Additional Product Features

Intended Audience
Scholarly & Professional
Dewey Edition
22
TitleLeading
A
Reviews
From the reviews: "This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. ... The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is also suitable for researchers and practitioners in industry." (Cryptologia, Vol. 30, 2006) "This book presents, using a chronological order, both conventional cryptography and public-key cryptography, as well as the two sides of cryptanalysis: adversary modelling and proof reduction. ... This advanced-level textbook is recommended for those interested in cryptography and its applications: students, researchers, computer scientists, mathematicians, engineers, and practitioners in industry." (Michael M. Dediu, Mathematical Reviews, Issue 2007 b), From the reviews:"This impressive hardback introduces fundamentals of information and communications security by providing mathematical concepts to prove or break the security of cryptographic schemes. … The book is designed for upper-level undergraduates and graduate level students in computer science. This comprehensive volume is also suitable for researchers and practitioners in industry." (Cryptologia, Vol. 30, 2006)"This book presents, using a chronological order, both conventional cryptography and public-key cryptography, as well as the two sides of cryptanalysis: adversary modelling and proof reduction. … This advanced-level textbook is recommended for those interested in cryptography and its applications: students, researchers, computer scientists, mathematicians, engineers, and practitioners in industry." (Michael M. Dediu, Mathematical Reviews, Issue 2007 b)
Number of Volumes
1 vol.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Prehistory of Cryptography.- Conventional Cryptography.- Dedicated Conventional Cryptographic Primitives.- ?Conventional Security Analysis.- Security Protocols with Conventional Cryptography.- Algorithmic Algebra.- Algorithmic Number Theory.- ?Elements of Complexity Theory.- Public-Key Cryptography.- Digital Signature.- ?Cryptographic Protocols.- From Cryptography to Communication Security.
Synopsis
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes. A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet., This book introduces the fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. It covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes. A Classical Introduction to Cryptography: Applications for Communications Security is rich with algorithms, such as exhaustive search with time/memory tradeoffs; proofs, such as security proofs for DSA-like signature schemes; and classical attacks such as collision attacks on MD4. Hard-to-find standards, e.g. SSH2 and security in Bluetooth, are also included.
LC Classification Number
QA268

Descrizione dell'oggetto fatta dal venditore

Informazioni sul venditore professionale

Informazioni su questo venditore

CollectorBonanza

100% di Feedback positivi9,3 mila oggetti venduti

Su eBay da mar 2005
Registrato come venditore professionale
We always want our customers to be happy with their order. No hassle, free returns within 30 days. Thank you for supporting a small family business. We appreciate your business.

Valutazione dettagliata del venditore

Media degli ultimi 12 mesi
Descrizione
4.9
Spese spedizione
5.0
Tempi di spedizione
5.0
Comunicazione
5.0

Feedback sul venditore (4.035)

Tutti i punteggiselected
Positivo
Neutro
Negativo
  • v***a (2)- Feedback lasciato dall'acquirente.
    Ultimi 6 mesi
    Acquisto verificato
    Book is as described with the exact version number. It is in very good condition and very well worth the purchase. It was properly packed in bubble wrap envelope with cardboard to protect the book from being bent. More importantly, this arrived on time as I need more structure in my review.
  • _***a (283)- Feedback lasciato dall'acquirente.
    Ultimo anno
    Acquisto verificato
    Great seller! Good experience! Item exactly as described. Well priced. Prompt shipping, securely packaged. Thank you very much! Seller was courteous and responded promptly. I'll buy from them again anytime!
  • 4***4 (118)- Feedback lasciato dall'acquirente.
    Mese scorso
    Acquisto verificato
    Good communication, quick delivery, good packaging and accurate description.