Buy Textbooks  |  Rent Textbooks  |  Sell Textbooks  |  eTextbooks
Help  |  Questions? 1-877-292-6442
Hello, Sign In
Your Account
0

Introduction to Cryptography with Coding Theory - 2nd edition

Introduction to Cryptography with Coding Theory (ISBN10: 0131862391; ISBN13: 9780131862395)
ISBN13: 978-0131862395
ISBN10: 0131862391

Summary: With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.

Features
  • Balances applied and theoretical aspects of security--Presents applications and protocols where cryptographic primitives are used in practice, such as SE
    T and SSL.
  • Coverage of Rijndael and AES--Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm.
  • Coverage of practical applications of cryptography to security protocols--Connects the cryptographic tools developed earlier in the book to the building of real security tools, demonstrating to students that there is more to security and cryptography than just math.
  • Friendly, story-like discussion of security concepts--Uses historical examples to illustrate the concepts of security and cryptanalysis by relating theory to easier-to-grasp events.
  • Modern methods such as Elliptic curves, Lattice methods, and Quantum Techniques--Provides thorough coverage of topics that are becoming increasingly prominent in the field.
  • Major coverage of coding theory--Offers a discussion of coding theory, which is often covered in today's cryptology courses.
  • Numerous example calculations--Includes many examples, especially in purely mathematical chapters such as Ch. 3.
  • Public key certificate--Provides an example of what an actual public key certificate looks like, rather than just describing it.
  • Mathematica/Maple/Matlab problems and notebooks--Allow students to work with realistic sized examples in RSA and Digital Signatures, as well as classical cryptosystems and those with elliptic curves.
  • Practical examples and applications--Give students hands-on experience with the large-numbered cryptography of today's security systems, and provides a discussion of security protocols.
New To This Edition
  • New problems in Chs. 3 and 6--Offers instructors an expanded problem set.
  • Sections on Legendre and Jacobi symbols and Continued Fractions in Ch. 3--Allows instructors to cover more advanced material (such as an attack on RSA) in later chapters.
  • More modes of operation in Ch. 4--Completes the discussion of block ciphers.
  • Additional attacks on RSA--Makes students aware of the strengths and shortcomings of this popular scheme.
  • New material on hash functions--Expands the coverage of these important cryptographic primitives, including recent advancements relevant to the security profession.
  • Updated discussion of multicollisions--Keeps students up-to-date on events that will have a significant impact on security systems over the next few years.
...show more
Summary: With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.

Features
  • Balances applied and theoretical aspects of security--Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL.
  • Coverage of Rijndael and AES--Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm.
  • Coverage of practical applications of cryptography to security protocols--Connects the cryptographic tools developed earlier in the book to the building of real security tools, demonstrating to students that there is more to security and cryptography than just math.
  • Friendly, story-like discussion of security concepts--Uses historical examples to illustrate the concepts of security and cryptanalysis by relating theory to easier-to-grasp events.
  • Modern methods such as Elliptic curves, Lattice methods, and Quantum Techniques--Provides thorough coverage of topics that are becoming increasingly prominent in the field.
  • Major coverage of coding theory--Offers a discussion of coding theory, which is often covered in today's cryptology courses.
  • Numerous example calculations--Includes many examples, especially in purely mathematical chapters such as Ch. 3.
  • Public key certificate--Provides an example of what an actual public key certificate looks like, rather than just describing it.
  • Mathematica/Maple/Matlab problems and notebooks--Allow students to work with realistic sized examples in RSA and Digital Signatures, as well as classical cryptosystems and those with elliptic curves.
  • Practical examples and applications--Give students hands-on experience with the large-numbered cryptography of today's security systems, and provides a discussion of security protocols.
New To This Edition
  • New problems in Chs. 3 and 6--Offers instructors an expanded problem set.
  • Sections on Legendre and Jacobi symbols and Continued Fractions in Ch. 3--Allows instructors to cover more advanced material (such as an attack on RSA) in later chapters.
  • More modes of operation in Ch. 4--Completes the discussion of block ciphers.
  • Additional attacks on RSA--Makes students aware of the strengths and shortcomings of this popular scheme.
  • New material on hash functions--Expands the coverage of these important cryptographic primitives, including recent advancements relevant to the security profession.
  • Updated discussion of multicollisions--Keeps students up-to-date on events that will have a significant impact on security systems over the next few years.
...show less

Edition/Copyright: 2ND 06
Cover: Hardback
Publisher: Prentice Hall, Inc.
Published: 07/15/2005
International: No

View Table of Contents



List Price: $166.25
Used $88.50
$44.25 after Buyback
Used
Save $77.75 (47%)
  • FREE shipping over $25
  • In stock
  • 30-day returns
Condition:
Order this book in the next 12 hours and 47 minutes and it ships by Noon CT tomorrow!
  • Sell back
    to us by
  • Guaranteed
    Cash Back
  • Book cost
    after Buyback
  • Jun 30, 2015
  • $44.25
  • $44.25
New $130.88
$65.44 after Buyback
Rental $18.49
Due back 08/14/2015
Marketplace sellers starting at $73.98

33 more offers below.

The Marketplace on Textbooks.com
Additional Sellers for Introduction to Cryptography with Coding Theory
Just for you, we curate a growing list of independent booksellers, giving you even MORE choices when shopping for your textbooks.
Keep in mind: Marketplace orders do NOT qualify for free shipping. More about the MarketplaceMore about the Marketplace

Filter by:   All (33)  |  New (17)  |  Like New (1)  |  Very Good (2)  |  Good (9)  |  Acceptable (4)

Price
 
Condition
Seller
Comments
$88.50
FREE! s/h

Very Good
Textbooks.com
Columbia, MO
Ships Ground DIRECTLY from Textbooks.com for FREE! Your cost after Guaranteed Cash Back: $44.25! Very good condition (Certified Used). Trackable expedited shipping options available.
$130.88
FREE! s/h

New
Textbooks.com
Columbia, MO
Ships DIRECTLY from Textbooks.com for FREE! Your cost after Guaranteed Cash Back: $65.44! Brand new book. Trackable expedited shipping options available.
$137.86
+$3.99 s/h
Add marketplace to your cart
New
Barnes & Noble.com
Various Shipping Locations, USA
Seller Rating: 5
Brand new, ships from the closest shipping location to your shipping address!
$73.98
+$3.99 s/h
Add marketplace to your cart
Acceptable
GICW Books
Hillsboro, OR
Seller Rating: 4.58
Textbook may contain underlining, highlighting or writing. Infotrac or untested CD may not be included.
$86.70
+$3.99 s/h
Add marketplace to your cart
Good
Used Textbook Depot
Pasadena, TX
Seller Rating: 4.54
Used copy - May have some markings / highlights
$88.50
+$3.99 s/h
Add marketplace to your cart
VeryGood
Textbookcenter.com
Columbia, MO
Seller Rating: 4.63
Ships same day or next business day via UPS (Priority Mail for AK/HI/APO/PO Boxes)! Used sticker and some writing and/or highlighting. Used books may not include working access code or dust jacket.
$104.85
+$3.99 s/h
Add marketplace to your cart
Good
Bookbyte-OR
Salem, OR
Seller Rating: 4.57
May include moderately worn cover, writing, markings or slight discoloration. SKU:9780131862395-4-0
$99.96
+$3.99 s/h
Add marketplace to your cart
Good
Campus_Bookstore
Fayetteville, AR
Seller Rating: 4.16
Used - Good Hardcover. 2nd Edition May contain highlighting/underlining/notes/etc. May have used stickers on cover. Ships same or next day. Expedited shipping takes 2-3 business days; standard shippin ...show moreg takes 4-14 business days. ...show less
$109.95
+$3.99 s/h
Add marketplace to your cart
Acceptable
omgtextbooks
Pueblo West, CO
Seller Rating: 3.84
Upper Saddle River, NJ 2005 Hard cover 2nd ed. Fair. Glued binding. Paper over boards. 577 p. Contains: Illustrations.
$130.88
+$3.99 s/h
Add marketplace to your cart
New
Textbookcenter.com
Columbia, MO
Seller Rating: 4.63
Ships same day or next business day! UPS(AK/HI Priority Mail)/ NEW book
$131.20
+$3.99 s/h
Add marketplace to your cart
Acceptable
GreatBookPrices
Montgomery, IL
Seller Rating: 4.18
Used, Acceptable Condition, may show signs of wear and previous use. Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.
$148.76
+$3.99 s/h
Add marketplace to your cart
New
GreatBookPrices
Montgomery, IL
Seller Rating: 4.18
Brand New, Perfect Condition, Please allow 4-14 business days for delivery. 100% Money Back Guarantee, Over 1,000,000 customers served.
$148.77
+$3.99 s/h
Add marketplace to your cart
New
PaperbackshopUS
Secaucus, NJ
Seller Rating: 4.48
New Book. Shipped from UK within 10 to 14 business days. Established seller since 2000.
Page:   1     2     3     4     |   Next >
Close
Close
Close