62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
31 °P sammeln
62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
31 °P sammeln
Als Download kaufen
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
31 °P sammeln
Jetzt verschenken
62,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
31 °P sammeln
  • Format: PDF

The proliferation of digital communication and electronic data exchange makes information security a central concern in industry, business, and administration. This book opens with coverage of key concepts of cryptography, from encryption and digital signatures to cryptographic protocols, demonstrating techniques and protocols for key exchange, user ID, electronic elections and digital cash. The second part addresses more advanced topics: bit security of one-way functions and computationally perfect pseudorandom bit generators. The book assumes no special background in mathematics, and…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 40.83MB
Produktbeschreibung
The proliferation of digital communication and electronic data exchange makes information security a central concern in industry, business, and administration. This book opens with coverage of key concepts of cryptography, from encryption and digital signatures to cryptographic protocols, demonstrating techniques and protocols for key exchange, user ID, electronic elections and digital cash. The second part addresses more advanced topics: bit security of one-way functions and computationally perfect pseudorandom bit generators. The book assumes no special background in mathematics, and includes the necessary algebra, number theory and probability theory in the appendix. Each chapter closes with a collection of exercises. The second edition offers numerous corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.