undrgrnd Cliquez ici Baby KDP nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici Cliquez ici Acheter Fire Shop Kindle cliquez_ici Jeux Vidéo Gifts
EUR 48,06
  • Tous les prix incluent la TVA.
Il ne reste plus que 3 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
Understanding Cryptograph... a été ajouté à votre Panier
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 3 images

Understanding Cryptography: A Textbook for Students and Practitioners (Anglais) Relié – 10 décembre 2009

1 commentaire client

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
"Veuillez réessayer"
EUR 48,06
EUR 35,17 EUR 43,60

Idées cadeaux Livres Idées cadeaux Livres

Idées cadeaux Livres
Retrouvez toutes nos idées cadeaux dans notre Boutique Livres de Noël.

Offres spéciales et liens associés

Descriptions du produit

Understanding Cryptography After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners. Full description

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Détails sur le produit

  • Relié: 372 pages
  • Editeur : Springer-Verlag Berlin and Heidelberg GmbH & Co. K; Édition : 1st ed. 2010 (10 décembre 2009)
  • Langue : Anglais
  • ISBN-10: 3642041000
  • ISBN-13: 978-3642041006
  • Dimensions du produit: 15,6 x 2,2 x 23,4 cm
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: 110.158 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?

En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre

(En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

5.0 étoiles sur 5
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Voir le commentaire client
Partagez votre opinion avec les autres clients

Commentaires client les plus utiles

1 internautes sur 1 ont trouvé ce commentaire utile  Par kervanoel le 26 octobre 2010
Format: Relié Achat vérifié
Excellent livre en Anglais.
Les auteurs expliquent de façon détaillée tous les aspects de la cryptographie. Cryptographie a clefs symétrique et asymétrique. Fonction de hachage et signature etc..
Nécessite un niveau de mathématiques élémentaires.
A recommander
Remarque sur ce commentaire Avez-vous trouvé ce commentaire utile ? Oui Non Commentaire en cours d'envoi...
Merci pour votre commentaire.
Désolé, nous n'avons pas réussi à enregistrer votre vote. Veuillez réessayer
Signaler un abus

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 46 commentaires
46 internautes sur 46 ont trouvé ce commentaire utile 
Perfection! 11 juillet 2010
Par Maor - Publié sur Amazon.com
Format: Relié
It is a summer tradition for me to pick a technical topic, find a textbook that represents the subject from an introductory point of view, and self-study as much of it as I can. This summer, I picked cryptography. After searching all over the place for a decent introductory book on the subject, I stumbled upon this one. Even though it only had 2 reviews at the time, I could tell that it was exactly what I was looking for. After reading the first 6 chapters of this book, all I can say is this: WOW!

Cryptography lies at the intersection of mathematics, computer science, and electrical engineering. This book borrows ideas from all 3 fields in order to describe the core ideas of cryptography in a surprisingly elegant way. The tone of the book is formal enough so that the book isn't disorganized or overly verbose, but not too formal that it makes the readings a chore.

As stated above, the content of the book is highly organized. The first 5 chapters deal with symmetric algorithms, and the next 5 or so deal with asymmetric algorithms. The last few chapters deal with hash functions and message authentication algorithms. In between highly-technical sections, you will find informal topics that are concerned with general security topics, history, or similar subjects. These sections are a wonderful break from the technical ones, and make this highly technical book read somewhat like a novel.

The figures in this book are wonderful, and really help the reader understand the encryption algorithms more fully. For example, the DES algorithm is somewhat convoluted, but the figures in the chapter make it very simple to see exactly what is happening at each stage of the process. Every permutation, bit slicing operation, and XOR operation is clearly evident from the flow diagrams. These diagrams, the mathematical descriptions of the encryption schemes, and the interesting discussions that follow make learning cryptography very simple!

After reading chapters 3, 4, and 5, I decided to make my own DES implementation in Python. Even though the book gives a wonderful description of the inner-workings of the DES algorithm, it doesn't provide many plaintext-key-ciphertext examples that can be used to test out my own implementation. I had to search Google for quite some time and use many different references to make sure that my implementation worked correctly. Thus, one of my only complaints about this book is that it doesn't go into quite enough technical details at some parts. I felt the same way when trying to implement the 3DES algorithm with modes other than ECB. The book doesn't seem to provide an answer as to how to combine 3DES with OFB or CBC, and I haven't quite found an answer on Google yet. However, this isn't meant to be a handbook of cryptography. It is meant to provide an understandable introduction to cryptography which will make the reader be able to keep up with more advanced books. This book does that perfectly.

It doesn't matter too much, but I'll include this anyway: I found a tiny error in chapter 2, and I told the authors about it. They very VERY friendly, and were very appreciative. It doesn't really change the quality of the book, but its nice to know that the authors really care about the quality of their work.

If I had one more complaint, it would be that this book is so interesting that it keeps me up until 3 AM every night! I miss sleeping!
26 internautes sur 26 ont trouvé ce commentaire utile 
Outstanding for self study 20 juin 2011
Par Jeffrey P. Goldberg - Publié sur Amazon.com
Format: Relié Achat vérifié
If you've heard people mention things like ECC, HMACs, discrete logarithms and wanted to what they were talking about; or if you wanted to understand who RSA and AES really work along with many other things, then this is the book for you.

I had been hunting for something more current than the 1996 Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition when I came across Understanding Cryptography. I could tell from the available samples and the table of contents, that it should meet my needs. It has not only met my needs, but has exceeded them in every respect.

This book was absolutely perfect for me, so it would be of some use for you to know my background.
I've long had an interest in cryptography but never any training. When I read Martin Gardener's famous 1977 article on RSA I thought it was the coolest thing ever, but I didn't fully grasp it and didn't pursue it at the time. In college I studied some math, but my degree is in linguistics, not in math or computing. I have read popularizations of cryptography, and had tried to make it though Applied Cryptography when it first came out in 1996, but I can't say that I really understood how the algorithms and the more intricate protocols worked. So that is roughly my background.

One of the great things about Understanding Cryptography is that it taught me exactly the math that I needed. You need to be comfortable learning new math. (I also found that I had to brush up on basic linear algebra on my own to understand one component of the deals of AES).

Working though this book on my own through self study took time. It is extremely well presented (with the possible exception of the final chapter, which could do with another round of copy-editing). The subject matter is not simple, so if you really wish to understand them you need to go through things very slowly, stopping frequently to check understanding, but everything you need is in the book without it being overly long. The excellent organization and presentation of the material means that I was able to get far, far more out of this book than anything else I have read on the topic.

The problem sets at the end of each chapter progress from easy to more challenging. I still need to go back and take on some of the more challenging ones I skipped the first time through. Often I was too eager to get to the new chapter than to work through the problems. As a consequence I missed some of the extended material that was presented through those problems sets.

Personally, my second favorite chapter is the chapter on AES which really steps through how it works and why each component does what it does. My favorite is the chapter on ECC. I had known wat ECC was used for, but before reading this, I had no idea of what it really was. Now I find it "the coolest thing ever". (OK, I may over use that phrase.) The authors' presentation of it is just right. They lead you though the process so that you can share in the delight of how ECC works.

Although I have worked though this as complete self-study, I would have preferred to do this as part of a class or at least some study group. Sometimes because I could have more quickly gotten through things that I held me up a few times, but mostly because I would have liked to share the experience. My wife and daughter are not entirely happy with the fact that I've been trying to teach them bits of what I've been learning over the month.

There are still bits that I don't fully understand. Some are questions not addressed in the book, but the further readings and bibliography are excellent. So I have the resources to investigate those. There are also bits that I don't fully understand because I haven't gone back and worked through the relevant exercises in the problem sets.

What I would like to see in a second addition:

(1) A bibliography for each chapter as well as the comprehensive one at the end
(2) A reworking of the final chapter, which appears rushed and not as well presented as everything else
(3) More on hash functions reflecting what is being learned now as part of the SHA3 process.

I am sure that this makes an outstanding textbook for a college course in the matter, but I want to add that it is so clearly presented, organized with introductions to the necessary math that it works for self-study as well.
38 internautes sur 41 ont trouvé ce commentaire utile 
Great Book! 20 septembre 2010
Par Mike G. - Publié sur Amazon.com
Format: Relié Achat vérifié
I came across this book on accident. I was googling around for articles by Preneel and found this book, in which he wrote the foreword. Frankly, I hope this book eventually replaces most, if not all of the mainstream texts on cryptography. My only complaint about this book is that I no longer feel like one of the rare geniuses that thoroughly and completely understands cryptography. Thanks to this book, any dummy off the street can understand cryptography nearly as well as I do and they do not need a computer science or math degree. No prerequisite knowledge is required, other than the ability to read but there is plenty of math if you want to study it. (Warning: I might be exaggerating a little. I really enjoy math and might be taking my math skills for granted. Just so I am clear, this is a Math textbook, which means the encryption algorithms are formally defined using math notation. However, the author's explanation of the math & algorithms is the most clear and easy to understand I have ever seen; which to me means, you do not need a strong background in mathematics to understand this material.)

The following categories are scored 1-10. 1 being the lowest, through 10, the highest...

- Readability (i.e. authors style of writing, is he to the point, write clear, how does he approach the topic, does he motivate, etc...)
Score: 10
I personally do not care for analogies in cryptography books. If the author knows what he is talking about and can explain it, there is absolutely no need for stupid analogies. Another thing that drives me crazy is authors that "challenge you to think" too much. They can never get to the point and come right out and tell you something. Half the time, I can't figure out if they actually either do not know what they are talking about, or they simply do not know how to explain something and hide it behind a series of challenging questions...which they themselves cannot answer(as if to be objective or something). Frankly, I am a professional with over 10 years of experience. I do not buy books so that authors can beat around the bush with their knowledge; which, by the way, I find condescending, because they are supposed to be the experts. When I pay money for a technical book, I do it with the expectation that the author is knowledgeable, qualified to write about the topic, and will not waste my time playing mind games with me. That is what is so surprising about this book; it clearly says "textbook" on the cover, which made me hesitate, thinking... maybe this is too elementary, or like many college textbooks, challenges you to think too much. However, contrary to my concerns, this book is to the point and carefully explains details that other authors seem to miss. In addition, it is very practical coverage and still challenging enough to be motivational, in other words, you do not have to drink twelve cups of coffee just to get through it. To summarize this section, at this stage in my career, I really appreciate authors that can "thoroughly explain things in the fewest possible words, while still being crystal clear!" (Apparently, this is something I myself cannot do, as evidence above, but that is why I do not write books)

- Organization
Score: 10
I have many cryptography books that talk about critical aspects of the encryption processes in isolation without tying them together; this book is very well organized in that respect.

- Real world Application (i.e. is this how it works in the real world or is this just theory that never gets used in practice)
Score: 9
This is another category that makes this book stand out because the coverage is very practical.

- Thoroughness (i.e. how rigorous is the book, is it a comprehensive review of technologies)
Score: 7
Great Introduction to many areas!

- Application & Implementation on Computer (i.e. code, algorithms, data-types, programming language tips/tricks...etc)
Score: 5
Most books attempt to provide code but the code is based on static input and is poorly written, leaving you to wonder, why on earth they even bothered to try. Actually coding algorithms is not the focus of this book... I don't think it contains one line of code, but you can encrypt and decrypt, end-2-end on paper, if you want to, after reading it. As I mentioned earlier, this is a math book, so the algorithms are presented in mathematical notation.

Edit: I have to add a disclaimer to this review. I originally read this book when I was knee deep in research and loved this book so much because the author tied together some concepts in such a concise explanation. This book is definitely a five star book but now that my initial excitement has worn off I think that some of my claims above may have been overinflated. I would recommend that the reader is comfortable with at least advanced algebra and discrete math. Sorry, I think I drank too much coffee before writing this review. Bottom line, this is not a detailed comprehensive book on cryptography, this is a short, concise, math based explanation about selected topics. The point that I was trying to make is not that this is a thorough book, but this is a high quality explanation of selected topics.
15 internautes sur 15 ont trouvé ce commentaire utile 
It's the videos, the videos, the videos. . . 20 avril 2014
Par TomDiehl - Publié sur Amazon.com
Format: Relié
The online videos make this book unbeatable. Just Google Paar's name and "cryptography" to find them. There are twenty-four 1.5hr lectures in which the author teaches directly out of this book. Given the book is less that 300 pages, the lectures are more comprehensive than the book.
Anytime you find yourself struggling to "connect the dots," just watch the pertinent video and you are there. I don't know of an easier way to learn this, or any, topic. This is what worked for me:
1. Quickly scan a chapter in the book. Just gloss over the parts you are struggling to understand.
2. Watch the accompanying video where the author guides you by the hand through the difficult sections,
3. Then re-read the sticky points of the book with total clarity.
It doesn't get any easier than that. I labeled my book throughout with notes like "L6, 1:17" to signify where and in which video lecture a topic was explained.
What other book on the topic can compete with this?
21 internautes sur 23 ont trouvé ce commentaire utile 
Great book, but far too many errors 16 janvier 2015
Par Laird Taylor - Publié sur Amazon.com
Format: Relié Achat vérifié
(My background is in mathematics only.) In general, the book is very well written and understandable and covers, insofar as I understand it, all the major areas of cryptography (but virtually no cryptanalysis). Were it not for the following, I would give the book five stars.

I am puzzled that no one else has mentioned that this book is RIFE with errors. This speaks badly not only for the authors, but also for the publisher. I list a selection of errors, generally putting the most important first. Mathematical typos, which can be difficult to detect by the student, are included if I found them. Other typos are not.

p 280. The code is AWFUL. The FOR variable is explicitly initialized and incremented within the loop. Line 2.3 shows arithmetic to the left of the assignment statement. If the authors insist on using = for assignment in 2.3 instead of the more readable arrow, they do NOT want the triple = sign. The number 4096 really should be explained somewhere.

p190-191. The explanation of Miller Rabin is impossible to understand as written and the code is incorrect (Input 17 and 4 to see that 17 turns out to be composite). Need to add code to leave loop when z = p-1. Language MUST be included somewhere that the code basically does the Fermat check and the check that x^2=1 has only two solutions in a field (i.e. when variable is prime). It should also be mentioned that we are doing no more than exponentiating in the usual squaring and multiplying fashion.

p209 C is NOT, as claimed, a group under complex multiplication; perhaps C – {0} was intended.

p16 The box is headed as the definition of ring. It is not. It is the definition of Z-m. Oddly, commutativity is not mentioned as a property on the next page.

p92 The definition of field does not include commutativity, so it is, instead, the definition of a division ring..

p40 line 7: mod m should be mod 2

p47,57 The terms “primitive polynomial” and “differential cryptanalyis” are used with no attempt at explanation.

p153 3 lines below box. “is a polynomial expression” is technically incorrect: “not bounded above by any polynomial” is much better

p164 2 lines below table: “multiplication” should be “subtraction”

p176 Last line of box is missing a “1”

p186 Shouldn’t speak of a speed-up of by a factor of 4 given the algorithms that are used for multiplication.

p189 line 1.2 in Fermat Primality Test is missing: “mod p tilde”

p267 line 9: replace “decryption” by “encryption”

p 271: Elgamal Signature Generation: remove 0,1 from list of random ephemeral keys

p274: 2nd line in “Reuse…” “a” should be “d” and parentheses needed around “p-1” in four places.

p325: In “The hash output length..”, “Longer” should be replaced with “shorter.”

p359 References: Very strange unreadable non-standard format. No student paper would be accepted with this format. Some items appear to be misplaced.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?