logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Cryptography: Theory and Practice by Douglas R. Stinson, Maura B. Paterson ISBN 9781138197015, 1138197017

  • SKU: EBN-7219148
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Cryptography: Theory and Practice after payment.
Authors:Douglas R. Stinson, Maura B. Paterson
Pages:598 pages.
Year:2018
Editon:4
Publisher:CRC Press
Language:english
File Size:22.74 MB
Format:pdf
ISBNS:9781138197015, 1138197017
Categories: Ebooks

Product desciption

(Ebook) Cryptography: Theory and Practice by Douglas R. Stinson, Maura B. Paterson ISBN 9781138197015, 1138197017

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.Key Features of the Fourth Edition:• New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).• New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).• New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).• An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.• Interesting attacks on cryptosystems, including: padding oracle attack, correlation attacks and algebraic attacks on stream ciphers, attack on the DUAL-EC random bit generator that makes use of a trapdoor.• A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.• Methods of key distribution in sensor networks.• The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.• The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.• The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products