Invia a Kindle o a un altro dispositivo

 
 
 

Prova gratis

Leggi gratuitamente l'inizio di questo eBook

Invia a Kindle o a un altro dispositivo

Grazie all'app Kindle GRATUITA per smartphone, tablet e computer, potrai leggere i libri Kindle, anche se non possiedi un dispositivo Kindle.
Cryptography (Discrete Mathematics and Its Applications)
 
Visualizza l'immagine in formato grande
 

Cryptography (Discrete Mathematics and Its Applications) [Print Replica] [Formato Kindle]

Douglas R. Stinson

Prezzo edizione digitale: EUR 55,98 Cos'è?
Prezzo Copertina Ed. Cartacea: EUR 61,18
Prezzo Kindle: EUR 39,18 include IVA (dove applicabile) e il download wireless gratuito con Amazon Whispernet
Risparmi: EUR 22,00 (36%)

Formati

Prezzo Amazon Nuovo a partire da Usato da
Formato Kindle EUR 39,18  
Copertina rigida --  

Descrizione prodotto

Sinossi

THE LEGACY… First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography. WHY A THIRD EDITION? The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: Pseudorandom bit generation in cryptography Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs Public key infrastructure, including identity-based cryptography Secret sharing schemes Multicast security, including broadcast encryption and copyright protection THE RESULT… Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

Dettagli prodotto

  • Formato: Formato Kindle
  • Dimensioni file: 10528 KB
  • Lunghezza stampa: 616
  • Editore: Chapman and Hall/CRC; 3 edizione (3 ottobre 2011)
  • Venduto da: Amazon Media EU S.à r.l.
  • Lingua: Inglese
  • ASIN: B006PKWCRI
  • Da testo a voce: Non abilitato
  • X-Ray:
  • Posizione nella classifica Bestseller di Amazon: #249.452 a pagamento nel Kindle Store (Visualizza i Top 100 a pagamento nella categoria Kindle Store)

Recensioni clienti

Non ci sono ancora recensioni di clienti su Amazon.it
5 stelle
4 stelle
3 stelle
2 stelle
1 stella
Le recensioni clienti più utili su Amazon.com (beta)
Amazon.com: 3.7 su 5 stelle  18 recensioni
26 di 27 persone hanno trovato utile la seguente recensione
3.0 su 5 stelle Could be a great book .... but it falls short 1 maggio 2004
Di Un cliente - Pubblicato su Amazon.com
Formato:Copertina rigida|Acquisto verificato
As other people have pointed out, this is not a mathematics book, and it is not an algorithm (recipies) book. It could be a great book for people that are interested in learning these tools to actually use them, either in a research or product development context (something besides homework). Unfortunately, the number of typos, in key mathematical expressions AND PORTIONS OF THE EXPLANATIONS is staggering. Go to the author's web page and you will find that some chapters, like 4 for example, average more than one typo per page (and some of these 'typos' are full sentences, or math expressions that do not look like anything that is actually printed on the page). If you do not have that errata sheet handy, you will waste a lot of time trying to understand the text, or trying to solve the exercises. If you are trying to learn from this book, without attending a class and without the errata, you will simply give up. It is a real shame because it has all the makings of a great book.
15 di 16 persone hanno trovato utile la seguente recensione
5.0 su 5 stelle It packs a lot in a small space 4 giugno 2001
Di Beryllium Sphere (r) L.L.C. - Pubblicato su Amazon.com
Formato:Copertina rigida
A book that tries to cover the theory and practice of cryptography in only four hundred pages has to make a lot of ruthless choices.
Professor Stinson wisely concentrates on theory, with a few nods to practice like explaining efficient modular exponentiation.
The theoretical material starts with the indispensable foundation of information theory and jumps straight into the operation of commercially important algorithms and their weaknesses. These are short but well done. For example Stinson has the best presentation of differential cryptanalysis that I've seen.
The breadth is good, covering most of the important magic that you can work with crypto: secret sharing, key exchange, zero knowledge proofs, etc.
Oddly, there doesn't seem to be a discussion of the blinding techniques used in Chaum's digital cash. Maybe that's because they're not yet a major part of the landscape, but then why spend space on the McEliece system?
A useful fraction of the book is accessible if you just have high school math, all of it with college math.
This would be a fine introduction to crypto.
16 di 18 persone hanno trovato utile la seguente recensione
5.0 su 5 stelle Volume III of the Definitive Work 17 aprile 2005
Di John Matlock - Pubblicato su Amazon.com
Formato:Copertina rigida
This book takes a fairly rigorous mathematical approach to cryptography. It is intended for upper level undergraduate and graduate students in mathematics, computer science and engineering. I suspect only the quite mathematically inclined computer science and engineering students will find this book helpful. This is not a Boy Scout how to do secret messages book, but a book that will give the professional the data needed to implement cryptographic software, and the mathematician hints on both code breaking and creating.

This is the third edition of this book. With the second edition, the author got rid of several several subjects that were not right at the core of cryptography, with the intend of doing a second volume. Instead, the art and scienct of cryptography has changed so fast during the past few years that a two volume approach isn't practical. Instead, he has produced this third edition that picks back up many of the subjects from the first edition. All of the material in this edition has been extensively re-written to incorporate the latest theories and practices.

In recent years the use of cryptography has increased by several orders of magnitude. Every time we buy something with a credit card, use on line banking, send a password to access e-mail, we use cryptography. With this growth, the interest at software companies, universities, and other places has grown accordingly and this text has become the standard by which others are compared.

Highly recommended for the serious student.
12 di 13 persone hanno trovato utile la seguente recensione
1.0 su 5 stelle Too many errors 9 gennaio 2003
Di Un cliente - Pubblicato su Amazon.com
Formato:Copertina rigida
The large number of errors and typographical mistakes in this book severly reduce its value as a reference or a textbook. A current errata list is available on the author's web site. In a book as math-centric as this one, typographical mistakes in key formulas and examples is inexcusable.
For what this book sells for, especially considering how short it is at less than 400 pages, they should have done a much better job proofreading and checking the excercises than they did before it hit the presses. Unless you need this as a text book, wait for the third edition or find another reference. This one isn't worth the money.
9 di 10 persone hanno trovato utile la seguente recensione
5.0 su 5 stelle Very good book! I have really enjoyed it! 2 maggio 2003
Di Paolo - Pubblicato su Amazon.com
Formato:Copertina rigida
The philosophy underlying the previous edition stays the same. The presentation of concepts is rigorous but neither difficult nor trivial, suitable for readers with basic notions of linear algebra. Moreover, new material has been added.
Chapter 3, which deals with block ciphers and linear and differential cryptoanalysis, is very well-written. This is the best presentation of such a subject in few pages I have seen until now.
Chapters 4, 5, 6 and 7 have been significantly updated and expanded with concepts and techniques that are fundamental in order to understand current researches and state of knowledge in Cryptography (e.g., random oracle model, semantic security, new attacks against public key cryptosystems, an in-depth introduction to elliptic curve ...).
Compared to the previous edition, more emphasys has been given in some parts to security proofs (e.g, chapter 4), and several new exercises have been proposed at the end of each chapter.

Other readers have pointed out that there are some typos (the author has made available an errata list on his home page) but I think that the value of the book is not reduced in any way.
In my opinion it is a great book for people who want to be introduced to problems, ideas, and techniques used in Cryptography.

Ricerca articoli simili per categoria