skip to main content
Skip header Section
Introduction to Cryptography: With Coding TheoryJanuary 2002
Publisher:
  • Prentice Hall PTR
  • Upper Saddle River, NJ
  • United States
ISBN:978-0-13-061814-6
Published:01 January 2002
Pages:
504
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security.

Cited By

  1. ACM
    Choi M, Jang J, Kwon Y, Lim S, Ho J and Wright M Split-Pipeline Model for Worm Propagation over IoT Proceedings of the 6th International Conference on the Internet of Things, (155-156)
  2. ACM
    Ma J, Tao J, Mayo J, Shene C, Keranen M and Wang C AESvisual Proceedings of the 2016 ACM Conference on Innovation and Technology in Computer Science Education, (230-235)
  3. Zeng L, Liu R, Zhang L, Liu Y and Wong K (2016). Cryptanalyzing an image encryption algorithm based on scrambling and Veginère cipher, Multimedia Tools and Applications, 75:10, (5439-5453), Online publication date: 1-May-2016.
  4. ACM
    Li C, Ma J, Tao J, Mayo J, Shene C, Keranen M and Wang C VIGvisual Proceedings of the 2015 ACM Conference on Innovation and Technology in Computer Science Education, (129-134)
  5. ACM
    Liu Z and Xu W Zeroing-in on network metric minima for sink location determination Proceedings of the third ACM conference on Wireless network security, (99-104)
  6. ACM
    Kamat P, Xu W, Trappe W and Zhang Y (2009). Temporal privacy in wireless sensor networks, ACM Transactions on Sensor Networks (TOSN), 5:4, (1-24), Online publication date: 1-Nov-2009.
  7. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K (2007). Opportunistic Encryption, IEEE Transactions on Dependable and Secure Computing, 4:4, (313-324), Online publication date: 1-Oct-2007.
  8. ACM
    Li Z, Xu W, Miller R and Trappe W Securing wireless systems via lower layer enforcements Proceedings of the 5th ACM workshop on Wireless security, (33-42)
  9. ACM
    Wong P and Zhang M Algebraic simplification of GP programs during evolution Proceedings of the 8th annual conference on Genetic and evolutionary computation, (927-934)
  10. ACM
    Bender A (2006). Review of "Codes: The Guide to Secrecy from Ancient to Modern Times by Richard A. Mollin", Chapman & Hall/CRC, 2005, ACM SIGACT News, 37:1, (18-21), Online publication date: 1-Mar-2006.
  11. Ertaul L and Lu W ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (i) Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (102-113)
  12. ACM
    De Palma P, Frank C, Gladfelter S and Holden J Cryptography and computer security for undergraduates Proceedings of the 35th SIGCSE technical symposium on Computer science education, (94-95)
  13. ACM
    De Palma P, Frank C, Gladfelter S and Holden J (2004). Cryptography and computer security for undergraduates, ACM SIGCSE Bulletin, 36:1, (94-95), Online publication date: 1-Mar-2004.
  14. ACM
    Irwin R (2003). Review of Coding theory and cryptography, ACM SIGACT News, 34:4, (17-21), Online publication date: 1-Dec-2003.
Contributors
  • University of Maryland, College Park
  • Wireless Information Network Laboratory

Recommendations