Ebook: A Classical Introduction to Cryptography Exercise Book
- Tags: Data Encryption, Data Structures Cryptology and Information Theory, Computer Communication Networks, Coding and Information Theory, Input/Output and Data Communications, Computer Systems Organization and Communication Networks
- Year: 2006
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005.
A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises.
The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005.
A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises.
The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005.
A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises.
The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
Content:
Front Matter....Pages i-xiv
Prehistory of Cryptography....Pages 1-15
Conventional Cryptography....Pages 17-56
Dedicated Conventional Cryptographic Primitives....Pages 57-80
Conventional Security Analysis....Pages 81-124
Security Protocols with Conventional Cryptography....Pages 125-134
Algorithmic Algebra....Pages 135-158
Algorithmic Number Theory....Pages 159-173
Elements of Complexity Theory....Pages 175-179
Public Key Cryptography....Pages 181-198
Digital Signatures....Pages 199-210
Cryptographic Protocols....Pages 211-229
From Cryptography to Communication Security....Pages 231-248
Back Matter....Pages 249-254
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005.
A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises.
The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.
Content:
Front Matter....Pages i-xiv
Prehistory of Cryptography....Pages 1-15
Conventional Cryptography....Pages 17-56
Dedicated Conventional Cryptographic Primitives....Pages 57-80
Conventional Security Analysis....Pages 81-124
Security Protocols with Conventional Cryptography....Pages 125-134
Algorithmic Algebra....Pages 135-158
Algorithmic Number Theory....Pages 159-173
Elements of Complexity Theory....Pages 175-179
Public Key Cryptography....Pages 181-198
Digital Signatures....Pages 199-210
Cryptographic Protocols....Pages 211-229
From Cryptography to Communication Security....Pages 231-248
Back Matter....Pages 249-254
....