×







We sell 100% Genuine & New Books only!

Cryptography Theory And Practice at Meripustak

Cryptography Theory And Practice by Douglas Robert Stinson Maura Paterson, T&F/Crc Press

Books from same Author: Douglas Robert Stinson Maura Paterson

Books from same Publisher: T&F/Crc Press

Related Category: Author List / Publisher List


  • Price: ₹ 4733.00/- [ 0.00% off ]

    Seller Price: ₹ 4733.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Douglas Robert Stinson Maura Paterson
    PublisherT&F/Crc Press
    Edition4th Edition
    ISBN9781032476049
    Pages598
    BindingSoftcover
    LanguageEnglish
    Publish YearJanuary 2023

    Description

    T&F/Crc Press Cryptography Theory And Practice by Douglas Robert Stinson Maura Paterson

    Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.Key Features of the Fourth Edition:New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.Interesting attacks on cryptosystems, including:padding oracle attackcorrelation attacks and algebraic attacks on stream ciphersattack on the DUAL-EC random bit generator that makes use of a trapdoor.A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.Methods of key distribution in sensor networks.The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.



    Book Successfully Added To Your Cart