logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Modern cryptography: theory and practice by Wenbo Mao ISBN 9780130669438, 9780132887410, 0130669431, 013288741X

  • SKU: EBN-1020672
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.3

10 reviews
Instant download (eBook) Modern cryptography: theory and practice after payment.
Authors:Wenbo Mao
Pages:755 pages.
Year:2003
Editon:1
Publisher:Prentice Hall
Language:english
File Size:17.8 MB
Format:pdf
ISBNS:9780130669438, 9780132887410, 0130669431, 013288741X
Categories: Ebooks

Product desciption

(Ebook) Modern cryptography: theory and practice by Wenbo Mao ISBN 9780130669438, 9780132887410, 0130669431, 013288741X

Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"—and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need.
Coverage includes:
• Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more
• Authentication: basic techniques and principles vs. misconceptions and consequential attacks
• Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos
• Designing stronger counterparts to vulnerable "textbook" crypto schemes
Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products