000 02417 a2200301 4500
001 1032917873
005 20250328151425.0
008 250324042024xx 75 eng
020 _a9781032917870
_qBC
037 _bTaylor & Francis
_cGBP 56.99
_fBB
040 _a01
041 _aeng
072 7 _aPBD
_2thema
072 7 _aPBCD
_2thema
072 7 _aPBV
_2thema
072 7 _aPBD
_2bic
072 7 _aPBCD
_2bic
072 7 _aPBV
_2bic
072 7 _aCOM053000
_2bisac
072 7 _aMAT000000
_2bisac
072 7 _aMAT036000
_2bisac
100 1 _aAlexander Stanoyevitch
245 1 0 _aIntroduction to Cryptography with Mathematical Foundations and Computer Implementations
250 _a1
260 _bChapman and Hall/CRC
_c20241014
300 _a672 p
520 _bFrom the exciting history of its development in ancient times to the present day, Introduction to Cryptography with Mathematical Foundations and Computer Implementations provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed. Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms. As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.
999 _c8460
_d8460