• Tous les prix incluent la TVA.
Habituellement expédié sous 1 à 4 mois.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Introduction to Modern Cr... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par BetterWorldBooksFr
État: D'occasion: Très bon
Commentaire: Expedié du Royaume-Uni. Ancien livre de bibliothèque. Condition très bonne pour un livre d'occasion. Usure minime. Sous garantie de remboursement complet. Votre achat aide a lutter contre l'analphabetisme dans le monde.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Introduction to Modern Cryptography: Principles and Protocols (Anglais) Relié – 31 août 2007


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Relié
"Veuillez réessayer"
EUR 79,98
EUR 53,31 EUR 18,59
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations

Il y a une édition plus récente de cet article:

click to open popover

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.

The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.

Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit


Quels sont les autres articles que les clients achètent après avoir regardé cet article?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.5 étoiles sur 5 11 commentaires
40 internautes sur 43 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 The definitive guide to Cryptography 26 septembre 2007
Par Vincenzo - Publié sur Amazon.com
Format: Relié
I used this book for a course on modern cryptography held by Prof. Persiano of the University of Salerno, Italy.
I read, consulted, and studied other books about cryptography, but 'INTRODUCTION TO MODERN CRYPTOGRAPHY' by Katz and Lindell is in my humble opinion THE BEST.
The book has a theoretical flavor, it is mathematically rigorous, but it is very readable and fluent, and presents the motivating discussions beneath each topic.
The book is fully self-contained, and gives the necessary background for each topic (for example there is a lot of basic computational number theory necessary for introducing the topic of 'public key').
The beauty of the book is in that the authors don't present a collection of protocols, with no links each other, but the flow is sequential and motivated (in contrast to books which present topics only for filling the pages).
All the theorems are proved and the treatment is rigorous, but the theory is developed from scratch, and the book is oriented to beginner students, though it presents also advanced stuff and is one of the most advanced book for beginners.
The main contents of the book are:

1) Perfect security and Shannon's theorem (information theoretic security)
2) Computational security, indistinguishability, CPA
3) Pseudorandomness
4) One-way functions, hard-core predicate, Levin's theorem
5) Message Authentication Codes
6) Costructions of Pseudorandom objects, AES, Substitution-Permutation networks
7) Relation between Private-Key, one-way functions and pseudrandomness.
8) Number theory for the cryptography
9) Computational number theory, factorization, square roots,discrete log,diffie-hellman problems
10) Public key, goldwasser-micali, el gamal, pallier, hybrid encryption, encryption schemes based on trapdoor permutations
11)Digital Signature Schemes
I wrote only some topics of the book following my taste, but the books contains much more.
The exercises left to the end of each chapters are good, and vary from easy to hard.
The book i read was in draft form, 320 pages long, but the final edition is about 500 pages long, cause addictional sections have been added.
Indeed in the introduction of my book the authors write that their planned to add to the final edition the following:

Elliptic curves
Sub-exponential factoring algorithms
The random oracle model and efficient cryptographic constructions
Protocols

Given that the final edition is 200 pages longer that my draft i think that these sections have been added.

I advice this book to everyone who wants start the study of modern cryptography from a theoretic and rigorous point of view.
After you read Katz and Lindell i suggest you to read "Foundations of Cryptography" by Goldreich, but it is too advanced and its reading requires you already read Katz and Lindell.
2 internautes sur 3 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Excellent book if you are serious about cryptography 24 mars 2014
Par traveler - Publié sur Amazon.com
Format: Relié Achat vérifié
It is not a casual read. It does not have little pieces of code you can program. It will change how you think.

This was a recommended optional book for a class I took on cryptography. The class was really challenging and changed how I look at things. The class was like a super compressed version of this book. For this reason it is nice to have.

Even though the class is over I am still working through the book.

You will discover that in modern cryptography there are a number of constructs that a useful encryption system must pass. When looked at in this way a number of encryption schemes are vulnerable and you will understand why. You will discover standards are not all good; that good standards can be are flawed by poor usage; and that you do not want to write your own.

You will gain confidence in how your data is encrypted. Best of all when you read someone's paper you will know what they are saying with all those little symbols and theorems.
11 internautes sur 17 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 IMHO Best Book on Cryptography 19 avril 2009
Par tech book reader - Publié sur Amazon.com
Format: Relié
This is a fantastic book, it was mandatory reading as part of my Masters in Information Security. I found it invaluable in understanding this seemingly 'mind-bending' subject.

I've bought numerous books on Crypto - however, this is the only one I've found that gets the balance between the maths and core principles/motivations spot on! I can't recommend this book enough, IMHO it's essential reading if you're pursuing a career in Information Security.
2 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Structured, Coherent, Rigorous foundations of Cryptography with also emphasis on Application, Implementation, and Practice 16 mai 2011
Par Raef B. Youssef - Publié sur Amazon.com
Format: Relié Achat vérifié
It was very nice to see how security would be possibly defined in a sense different from (and more relaxed than) information-theoretic secrecy. It was nice to see how different definitions would lead to different levels of security, or in other words, each definition gives a guarantee of security against a certain class of real-life security threats (or attacks) and takes also into account very practical issues like dealing with computationally bounded adversaries. Moreover, introducing the notion of security using those definitions made the whole setting, not only mathematically rigorous, but also coherent, structured, and well-founded, without losing contact with practical concerns and real-life scenarios. Even more, this setting gave a neat and mathematically sound way to attain a proven notion of security rather than just introducing or suggesting schemes that show "good" performance in practice without being able to say anything, or quantify the security they provide on a more fundamental level. Another thing I also liked very much and is related to the point above, is how the book moves on to the point where it was shown that the provable security of almost (if not all) the encryption schemes (either private-key or public-key based) as well as authentication codes and signature schemes is based on the corner stone assumption of existence of one-way functions (one-way permutations). It was very elegant the way a one-way function (permutation) was defined and the way it is used to prove security in one sense or the other. It fits in very well in the development of the theory and made the whole structure very homogeneous. That is why Chapter 6, in my opinion, was one of the most important chapters that set the foundations of attaining provable security and build the bridge between assumptions and theory (one-way functions and hardcore predicates) on one side and practice on the other (pseudo-random generators and pseudo-random functions).Finally, public-key encryption schemes and digital signatures are also, definitely, on my long favorites list of this book. It was very exciting and intellectually stimulating to read how these schemes work and how they are (or most of them at least) shown to be secure in one sense or the other (i.e., attaining provable security ). Actually, it was useful to me to know all these practical issues related to these schemes like implementation and design issues of El Gamal and the (padded) RSA schemes, as well as the practical considerations that set many differences between private and public key encryption schemes. The same is also true with digital signatures. Also, discussing various real-life attacks (especially those against schemes that are widely used in cryptographic standards like the padded RSA and El Gamal schemes) was a very important ingredient that made the whole material in this book interesting and very engaging.
0 internautes sur 2 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Can be a little heavy 27 août 2013
Par uayfb1 - Publié sur Amazon.com
Format: Relié Achat vérifié
The authors are honest enough to inform you that they assume that you have a rather high attainment in math in this book. It is heavy going in where discussions are made about pseudorandom numbers and such like. If you are doing (or thinking of doing ) a course in cryptology, however, this is a good book to start with. Not recommended for the casual reader.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?