CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Modern cryptography : theory and practice / Wenbo Mao.

By: Material type: TextTextPublication details: Upper Saddle River, NJ : Prentice Hall PTR, c2004.Description: xxxviii, 707 p. : ill. ; 24 cmISBN:
  • 0130669431
  • 9780130669438
  • 813170212X
Subject(s): DDC classification:
  • 005.82
Contents:
I. Introduction -- 1. Beginning with a Simple Communication Game -- 2. Wrestling Between Safeguard and Attack -- II. Mathematical Foundations -- Standard Notation -- 3. Probability and Information Theory -- 4. Computational Complexity -- 5. Algebraic Foundations -- 6. Number Theory -- III. Basic Cryptographic Techniques -- 7. Encryption - Symmetric Techniques -- 8. Encryption - Asymmetric Techniques -- 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions -- 10. Data Integrity Techniques -- IV. Authentication -- 11. Authentication Protocols - Principles -- 12. Authentication Protocols - The Real World -- 13. Authentication Framework for Public-Key Cryptography -- V. Formal Approaches to Security Establishment -- 14. Formal and Strong Security Definitions for Public-Key Cryptosystems -- 15. Provably Secure and Efficient Public-Key Cryptosystems -- 16. Strong and Provable Security for Digital Signatures -- 17. Formal Methods for Authentication Protocols Analysis -- VI. Cryptographic Protocols -- 18. Zero-Knowledge Protocols -- 19. Returning to "Coin Flipping Over Telephone" -- 20. Afterremark.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
Books Books Central Library, KUET General Stacks 005.82 MAO (Browse shelf(Opens below)) 1 Available 3010044036
Total holds: 0

Includes bibliographical references (p. 673-698) and index.

I. Introduction -- 1. Beginning with a Simple Communication Game -- 2. Wrestling Between Safeguard and Attack -- II. Mathematical Foundations -- Standard Notation -- 3. Probability and Information Theory -- 4. Computational Complexity -- 5. Algebraic Foundations -- 6. Number Theory -- III. Basic Cryptographic Techniques -- 7. Encryption - Symmetric Techniques -- 8. Encryption - Asymmetric Techniques -- 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions -- 10. Data Integrity Techniques -- IV. Authentication -- 11. Authentication Protocols - Principles -- 12. Authentication Protocols - The Real World -- 13. Authentication Framework for Public-Key Cryptography -- V. Formal Approaches to Security Establishment -- 14. Formal and Strong Security Definitions for Public-Key Cryptosystems -- 15. Provably Secure and Efficient Public-Key Cryptosystems -- 16. Strong and Provable Security for Digital Signatures -- 17. Formal Methods for Authentication Protocols Analysis -- VI. Cryptographic Protocols -- 18. Zero-Knowledge Protocols -- 19. Returning to "Coin Flipping Over Telephone" -- 20. Afterremark.

There are no comments on this title.

to post a comment.

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh