Book description
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experienc
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface (1/2)
- Preface (2/2)
- Chapter 1. Introduction to cryptography (1/5)
- Chapter 1. Introduction to cryptography (2/5)
- Chapter 1. Introduction to cryptography (3/5)
- Chapter 1. Introduction to cryptography (4/5)
- Chapter 1. Introduction to cryptography (5/5)
- Chapter 2. Basic number theory (1/7)
- Chapter 2. Basic number theory (2/7)
- Chapter 2. Basic number theory (3/7)
- Chapter 2. Basic number theory (4/7)
- Chapter 2. Basic number theory (5/7)
- Chapter 2. Basic number theory (6/7)
- Chapter 2. Basic number theory (7/7)
- Chapter 3. Classical cryptosystems (1/5)
- Chapter 3. Classical cryptosystems (2/5)
- Chapter 3. Classical cryptosystems (3/5)
- Chapter 3. Classical cryptosystems (4/5)
- Chapter 3. Classical cryptosystems (5/5)
- Chapter 4. Introduction to information theory (1/3)
- Chapter 4. Introduction to information theory (2/3)
- Chapter 4. Introduction to information theory (3/3)
- Chapter 5. Public-key cryptosystems based on factoring (1/6)
- Chapter 5. Public-key cryptosystems based on factoring (2/6)
- Chapter 5. Public-key cryptosystems based on factoring (3/6)
- Chapter 5. Public-key cryptosystems based on factoring (4/6)
- Chapter 5. Public-key cryptosystems based on factoring (5/6)
- Chapter 5. Public-key cryptosystems based on factoring (6/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (1/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (2/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (3/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (4/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (5/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (6/6)
- Chapter 7. Digital signatures (1/5)
- Chapter 7. Digital signatures (2/5)
- Chapter 7. Digital signatures (3/5)
- Chapter 7. Digital signatures (4/5)
- Chapter 7. Digital signatures (5/5)
- Chapter 8. Block ciphers and the data encryption standard (1/10)
- Chapter 8. Block ciphers and the data encryption standard (2/10)
- Chapter 8. Block ciphers and the data encryption standard (3/10)
- Chapter 8. Block ciphers and the data encryption standard (4/10)
- Chapter 8. Block ciphers and the data encryption standard (5/10)
- Chapter 8. Block ciphers and the data encryption standard (6/10)
- Chapter 8. Block ciphers and the data encryption standard (7/10)
- Chapter 8. Block ciphers and the data encryption standard (8/10)
- Chapter 8. Block ciphers and the data encryption standard (9/10)
- Chapter 8. Block ciphers and the data encryption standard (10/10)
- Chapter 9. Finite fields (1/6)
- Chapter 9. Finite fields (2/6)
- Chapter 9. Finite fields (3/6)
- Chapter 9. Finite fields (4/6)
- Chapter 9. Finite fields (5/6)
- Chapter 9. Finite fields (6/6)
- Chapter 10. The Advanced Encryption Standard (1/5)
- Chapter 10. The Advanced Encryption Standard (2/5)
- Chapter 10. The Advanced Encryption Standard (3/5)
- Chapter 10. The Advanced Encryption Standard (4/5)
- Chapter 10. The Advanced Encryption Standard (5/5)
- Chapter 11. Hash functions (1/6)
- Chapter 11. Hash functions (2/6)
- Chapter 11. Hash functions (3/6)
- Chapter 11. Hash functions (4/6)
- Chapter 11. Hash functions (5/6)
- Chapter 11. Hash functions (6/6)
- Chapter 12. Elliptic curves and cryptosystems (1/8)
- Chapter 12. Elliptic curves and cryptosystems (2/8)
- Chapter 12. Elliptic curves and cryptosystems (3/8)
- Chapter 12. Elliptic curves and cryptosystems (4/8)
- Chapter 12. Elliptic curves and cryptosystems (5/8)
- Chapter 12. Elliptic curves and cryptosystems (6/8)
- Chapter 12. Elliptic curves and cryptosystems (7/8)
- Chapter 12. Elliptic curves and cryptosystems (8/8)
- Chapter 13. Random numbers and stream ciphers (1/6)
- Chapter 13. Random numbers and stream ciphers (2/6)
- Chapter 13. Random numbers and stream ciphers (3/6)
- Chapter 13. Random numbers and stream ciphers (4/6)
- Chapter 13. Random numbers and stream ciphers (5/6)
- Chapter 13. Random numbers and stream ciphers (6/6)
- Chapter 14. Advanced applications and protocols (1/7)
- Chapter 14. Advanced applications and protocols (2/7)
- Chapter 14. Advanced applications and protocols (3/7)
- Chapter 14. Advanced applications and protocols (4/7)
- Chapter 14. Advanced applications and protocols (5/7)
- Chapter 14. Advanced applications and protocols (6/7)
- Chapter 14. Advanced applications and protocols (7/7)
- Appendix A. Introduction to Sage (1/4)
- Appendix A. Introduction to Sage (2/4)
- Appendix A. Introduction to Sage (3/4)
- Appendix A. Introduction to Sage (4/4)
- Appendix B. Advanced computational number theory (1/3)
- Appendix B. Advanced computational number theory (2/3)
- Appendix B. Advanced computational number theory (3/3)
- Bibliography (1/2)
- Bibliography (2/2)
- Back Cover
Product information
- Title: Introduction to Cryptography with Open-Source Software
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781439825716
You might also like
book
Implementing SSL/TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a …
book
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to …
book
Practical Cryptography
Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, …
book
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most …