Book Details

Instructors may access teaching resources by clicking the ‘Request Instructor Resources’ tab next to the title.
Please note that you can subscribe to a maximum of 2 titles.

Public-Key Cryptography: Theory and Practice, 1/e


Public-Key Cryptography: Theory and Practice, 1/e
Author(s)  Abhijit Das and C. E. Veni Madhavan
ISBN  9788131708323
Imprint  Pearson Education
Copyright  2009
Pages  584
Binding  Paperback
List Price  Rs. 1050.00
  
 
 

Public-key Cryptography provides a comprehensive coverage of the mathematical tools required for understanding the techniques of public-key cryptography and cryptanalysis. Key topics covered in the book include common cryptographic primitives and symmetric techniques, quantum cryptography, complexity theory, and practical cryptanalytic techniques such as side-channel attacks and backdoor attacks.

Organized into eight chapters and supplemented with four appendices, this book is designed to be a self-sufficient resource for all students, teachers and researchers interested in the field of cryptography.
  • About the Authors
  • Contents
  • Features
  • Downloadable Resources

Abhijit Das is Assistant Professor, Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur. He has held academic positions at the Indian Institute of Technology Kanpur and Ruhr-Universität Bochum, Germany. His research interests include arithmetic and algebraic computations with specific applications to cryptology.

Click here to visit the author's homepage.

C. E. Veni Madhavan is Professor, Department of Computer Science and Automation, Indian Institute of Science, Bangalore. His research, teaching, and development interests include cryptography, steganography, and arithmetic, algebraic, and combinatorial algorithms.
 

Preface
Notations

  1. Overview
  2. Mathematical Concepts
  3. Algebraic and Number-theoretic Computations
  4. The Intractable Mathematical Problems
  5. Cryptographic Algorithms
  6. Standards
  7. Cryptanalysis in Practice
  8. Quantum Computation and Cryptography

Appendices
  1. Symmetric Techniques
  2. Key Exchange in Sensor Networks
  3. Complexity Theory and Cryptography
  4. Hints to Selected Exercises

References
Index
 

  • Detailed coverage of public-key cryptography standards and definitions.
  • Examples, algorithms and mathematical results integrated throughout the chapters.
  • Exercises to deepen the understanding of the concepts discussed in the chapters.
  • Appendices on symmetric techniques, key exchange in sensor networks, complexity theory and cryptography, and hints for deriving solutions to complex problems.
  • Topics graded according to difficulty level.
 
 
Username/ Email  
Password  
If you are new to this site, and you do not have a username and password, please register.