買這商品的人也買了...
- 
                
                  
                  
                Invitation to Cryptography$980$960 - 
                
                  
                  
                Fundamentals of Computer Security (Hardcover)$1,300$1,274 - 
                
                  
                  
                Security in Computing, 3/e (平裝)$980$960 - 
                
                  
                  
                Internet Security: Cryptographic Principles, Algorithms and Protocols (Hardcover)$980$960 - 
                
                  
                  
                Information Theory, Coding and Cryptography (Paperback)$680$666 - 
                
                  
                  
                深入淺出設計模式 (Head First Design Patterns)$880$695 - 
                
                  
                  
                深入淺出 Java 程式設計, 2/e (Head First Java, 2/e)$880$695 - 
                
                  
                  
                Service-Oriented Architecture Compass: Business Value, Planning, and Enterprise Roadmap (Hardcover)$1,650$1,568 - 
                
                  
                  
                Complexity and Cryptography: An Introduction (Paperback)$1,150$1,127 - 
                
                  
                  
                $399Foundations of Computer Security (Hardcover)(書況舊有褪色及黴斑,不介意在下單) - 
                
                  
                  
                ASP.NET 2.0 深度剖析範例集$650$507 - 
                
                  
                  
                SQL 語法範例辭典$550$468 - 
                
                  
                  
                專案管理黑皮書$270$213 - 
                
                  
                  
                CSS、HTML、XHTML 精緻範例辭典$450$383 - 
                
                  
                  
                Linux 驅動程式, 3/e (Linux Device Drivers, 3/e)$980$774 - 
                
                  
                  
                嵌入式設計及 Linux 驅動開發指南─基於 ARM9 處理器, 2/e$420$399 - 
                
                  
                  
                ADO.NET 2.0 實戰講座$690$545 - 
                
                  
                  
                深入淺出物件導向分析與設計 (Head First Object-Oriented Analysis and Design)$880$695 - 
                
                  
                  
                Risks, Controls, and Security : Concepts and Applications$2,600$2,470 - 
                
                  
                  
                鳥哥的 Linux 伺服器架設篇, 2/e$780$663 - 
                
                  
                  
                鳥哥的 Linux 伺服器架設篇, 2/e & 鳥哥的 Linux 私房菜基礎學習篇, 2/e$1,560$1,326 - 
                
                  
                  
                ASP.NET 應用程式開發─與 AJAX 共舞$620$490 - 
                
                  
                  
                Protecting Information: From Classical Error Correction to Quantum Cryptography$820$804 - 
                
                  
                  
                現代嵌入式系統開發專案實務-菜鳥成長日誌與專案經理的私房菜$600$480 - 
                
                  
                  
                Computer Security and Cryptography$5,470$5,197 
商品描述
Description
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.
This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.
A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.
Table of contents
Preamble
1: Prehistory of Cryptography
1.1 Foundations of Conventional Cryptography
1.2 Roots of Modern Cryptography
1.3 The Shannon Theory of Secrecy
1.4 Exercises
2: Conventional Cryptography
2.1 The Data Encryption Standard (DES)
2.2 DES Modes of Operation
2.3 Multiple Encryption
2.4 An Application of DES: UNIX Passwords
2.5 Classical Cipher Skeletons
2.6 Other Block Cipher Examples
2.7 The Advanced Encryption Standard (AES)
2.8 Stream Ciphers
2.9 Brute Force Attacks
2.10 Exercises
3: Dedicated Conventional Cryptographic Primitives
3.1 Cryptographic Hashing
3.2 The Birthday Paradox
3.3 A Dedicated Attack on MD4
3.4 Message Authentication Codes
3.5 Cryptographic Pseudorandom Generators
3.6 Exercises4: Conventional Security Analysis
4.1 Differential Cryptanalysis
4.2 Linear Cryptanalysis
4.3 Classical Security Strengthening
4.4 Modern Security Analysis
4.5 Exercises
5: Security Protocols with Conventional Cryptography
5.1 Password Access Control
5.2 Challenge-Response Protocols
5.3 One-Time Password
5.4 Key Distribution
5.5 Authentication Chains
5.6 Wireless Communication: Two Case Studies
5.7 Exercises6: Algorithmic Algebra
6.1 Basic Group Theory
6.2 The Ring Zn
6.3 The Finite Field Zn
6.4 Finite Fields
6.5 Elliptic Curves over Finite Fields
6.6 Exercises7: Algorithmic Number Theory
7.1 Primality
7.2 Factorization
7.3 Computing Orders in Groups
7.4 Discrete Logarithm
7.5 Exercises8: Elements of Complexity Theory
8.1 Formal Computation
8.2 Ability Frontiers
8.3 Complexity Reduction
8.4 Exercises
9: Public-Key Cryptography
9.1 Diffie-Hellman
9.2 Experiment with NP-Completeness
9.3 Rivest-Shamir-Adleman (RSA)
9.4 ElGamal Encryption
9.5 Exercises
10: Digital Signature
10.1 Digital Signature Schemes
10.2 RSA Signature
10.3 ElGamal Signature Family
10.4 Toward Provable Security for Digital Signatures
10.5 Exercises
11: Cryptographic Protocols
11.1 Zero-Knowledge
11.2 Secret Sharing
11 3 Special Purpose Digital Signatures
11.4 Other Protocols
11.5 Exercises12: From Cryptography to Communication Security
12.1 Certificates
12.2 SSH: Secure Shell
12.3 SSL: Secure Socket Layer
12.4 PGP: Pretty Good Privacy
12.5 Exercises
Further Readings
Bibliography
Index
商品描述(中文翻譯)
**描述**  
《古典密碼學導論:通訊安全的應用》介紹了信息和通訊安全的基本原理,提供適當的數學概念來證明或破解密碼方案的安全性。  
這本進階教材涵蓋了傳統密碼學原語及其密碼分析;密碼學家的基本代數和數論;公鑰密碼學及其方案的密碼分析;以及其他密碼協議,例如秘密分享、零知識證明和不可否認簽名方案。  
《古典密碼學導論:通訊安全的應用》旨在為計算機科學的高年級本科生和研究生設計。本書也適合業界的研究人員和從業者。另有單獨的練習/解答手冊可供購買,詳情請訪問 www.springeronline.com,作者為 Vaudenay。
**目錄**  
前言  
1:密碼學的前史  
1.1 傳統密碼學的基礎  
1.2 現代密碼學的根源  
1.3 香農的保密理論  
1.4 練習  
2:傳統密碼學  
2.1 數據加密標準 (DES)  
2.2 DES 的運作模式  
2.3 多重加密  
2.4 DES 的應用:UNIX 密碼  
2.5 古典密碼骨架  
2.6 其他區塊密碼示例  
2.7 高級加密標準 (AES)  
2.8 流密碼  
2.9 暴力破解攻擊  
2.10 練習  
3:專用的傳統密碼學原語  
3.1 密碼雜湊  
3.2 生日悖論  
3.3 對 MD4 的專用攻擊  
3.4 消息認證碼  
3.5 密碼學偽隨機生成器  
3.6 練習  
4:傳統安全分析  
4.1 差分密碼分析  
4.2 線性密碼分析  
4.3 古典安全強化  
4.4 現代安全分析  
4.5 練習  
5:使用傳統密碼學的安全協議  
5.1 密碼訪問控制  
5.2 挑戰-回應協議  
5.3 一次性密碼  
5.4 密鑰分發  
5.5 認證鏈  
5.6 無線通信:兩個案例研究  
5.7 練習  
6:算法代數  
6.1 基本群論  
6.2 環 Zn  
6.3 有限域 Zn  
6.4 有限域  
6.5 有限域上的橢圓曲線  
6.6 練習  
7:算法數論  
7.1 質數性  
7.2 因式分解  
7.3 計算群中的階  
7.4 離散對數  
7.5 練習  
8:複雜性理論的元素  
8.1 正式計算  
8.2 能力邊界  
8.3 複雜性減少  
8.4 練習  
9:公鑰密碼學  
9.1 Diffie-Hellman  
9.2 NP 完全性實驗  
9.3 Rivest-Shamir-Adleman (RSA)  
9.4 ElGamal 加密  
9.5 練習  
10:數位簽名  
10.1 數位簽名方案  
10.2 RSA 簽名  
10.3 ElGamal 簽名家族  
10.4 朝向可證明的數位簽名安全性  
10.5 練習  
11:密碼協議  
11.1 零知識  
11.2 秘密分享  
11.3 特殊用途數位簽名  
11.4 其他協議  
11.5 練習  
12:從密碼學到通訊安全  
12.1 證書  
12.2 SSH:安全外殼  
12.3 SSL:安全套接層  
12.4 PGP:相當好的隱私  
12.5 練習  
進一步閱讀  
參考文獻  
索引  
