Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Cryptography : theory and practice / Douglas R. Stinson, Maura B. Paterson.

By: Contributor(s): Material type: TextTextSeries: Textbooks in mathematicsPublication details: Boca Ratan: CRC Press, 2019Edition: 4th (Special Indian Edition)Description: xvii, 580 pages ills; 23.5 cmISBN:
  • 9780367148591
Subject(s): DDC classification:
  • 005.82 St859 23
LOC classification:
  • QA268 S75 2019
Contents:
Preface -- 1.Introduction to Cryptography -- 2.Classical Cryptography -- 3.Shannon's Theory, Perfect Secrecy and the One-Time Pad -- 4.Block Ciphers and Stream Ciphers -- 5.Hash Functions and Message Authentication -- 6.The RSA Cryptosystem and Factoring Integers -- 7.Public-Key Cryptography and Discrete Logarithms -- 8. Signature Schemes -- 9.Post-quantum Cryptography -- 10.Identification Schemes and Entity Authentication -- 11.Key Distribution -- 12.Key Agreement Schemes -- 13.Miscellaneous Topics -- A Number Theory and Algebraic Concepts for Cryptography -- B Pseudorandom Bit Generation for Cryptography Appendix A: Number Theory and Algebraic Concepts for Cryptography, Appendix B: Pseudorandom Bit Generation for Cryptography -- Bibliography -- Index
Summary: Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9). New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1). New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A). An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books ISI Library, Kolkata 005.82 St859 (Browse shelf(Opens below)) Available 138459
Total holds: 0

Includes bibliographical references and index.

Preface -- 1.Introduction to Cryptography -- 2.Classical Cryptography -- 3.Shannon's Theory, Perfect Secrecy and the One-Time Pad -- 4.Block Ciphers and Stream Ciphers -- 5.Hash Functions and Message Authentication -- 6.The RSA Cryptosystem and Factoring Integers -- 7.Public-Key Cryptography and Discrete Logarithms -- 8. Signature Schemes -- 9.Post-quantum Cryptography -- 10.Identification Schemes and Entity Authentication -- 11.Key Distribution -- 12.Key Agreement Schemes -- 13.Miscellaneous Topics -- A Number Theory and Algebraic Concepts for Cryptography -- B Pseudorandom Bit Generation for Cryptography Appendix A: Number Theory and Algebraic Concepts for Cryptography, Appendix B: Pseudorandom Bit Generation for Cryptography -- Bibliography -- Index

Key Features of the Fourth Edition:
New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers
attack on the DUAL-EC random bit generator that makes use of a trapdoor.
A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
Methods of key distribution in sensor networks.
The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in