From the Publisher:
This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security.
Cited By
- Choi M, Jang J, Kwon Y, Lim S, Ho J and Wright M Split-Pipeline Model for Worm Propagation over IoT Proceedings of the 6th International Conference on the Internet of Things, (155-156)
- Ma J, Tao J, Mayo J, Shene C, Keranen M and Wang C AESvisual Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education, (230-235)
- Zeng L, Liu R, Zhang L, Liu Y and Wong K (2016). Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher, Multimedia Tools and Applications, 75:10, (5439-5453), Online publication date: 1-May-2016.
- Li C, Ma J, Tao J, Mayo J, Shene C, Keranen M and Wang C VIGvisual Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, (129-134)
- Liu Z and Xu W Zeroing-in on network metric minima for sink location determination Proceedings of the third ACM conference on Wireless network security, (99-104)
- Kamat P, Xu W, Trappe W and Zhang Y (2009). Temporal privacy in wireless sensor networks, ACM Transactions on Sensor Networks (TOSN), 5:4, (1-24), Online publication date: 1-Nov-2009.
- Haleem M, Mathur C, Chandramouli R and Subbalakshmi K (2007). Opportunistic Encryption, IEEE Transactions on Dependable and Secure Computing, 4:4, (313-324), Online publication date: 1-Oct-2007.
- Li Z, Xu W, Miller R and Trappe W Securing wireless systems via lower layer enforcements Proceedings of the 5th ACM workshop on Wireless security, (33-42)
- Wong P and Zhang M Algebraic simplification of GP programs during evolution Proceedings of the 8th annual conference on Genetic and evolutionary computation, (927-934)
- Bender A (2006). Review of "Codes: The Guide to Secrecy from Ancient to Modern Times by Richard A. Mollin", Chapman & Hall/CRC, 2005, ACM SIGACT News, 37:1, (18-21), Online publication date: 1-Mar-2006.
- Ertaul L and Lu W ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i) Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (102-113)
- De Palma P, Frank C, Gladfelter S and Holden J Cryptography and computer security for undergraduates Proceedings of the 35th SIGCSE technical symposium on Computer science education, (94-95)
- De Palma P, Frank C, Gladfelter S and Holden J (2004). Cryptography and computer security for undergraduates, ACM SIGCSE Bulletin, 36:1, (94-95), Online publication date: 1-Mar-2004.
- Irwin R (2003). Review of Coding theory and cryptography, ACM SIGACT News, 34:4, (17-21), Online publication date: 1-Dec-2003.