Stinson, Douglas R.

Cryptography : theory and practice / Douglas R. Stinson. - 3rd ed. - Boca Raton : Chapman & Hall/CRC, 2006 - 593 p. : ill. ; 25 cm.

CLASSICAL CRYPTOGRAPHYIntroduction: Some Simple CryptosystemsCryptanalysisNotesExercisesSHANNON'S THEORYIntroductionElementary Probability TheoryPerfect SecrecyEntropyProperties of EntropySpurious Keys and Unicity DistanceProduct CryptosystemsNotesExercisesBLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARDIntroductionSubstitution-Permutation NetworksLinear CryptanalysisDifferential CryptanalysisThe Data Encryption StandardThe Advanced Encryption StandardModes of OperationNotes and ReferencesExercisesCRYPTOGRAPHIC HASH FUNCTIONSHash Functions and Data IntegritySecurity of Hash FunctionsIterated Hash FunctionsMessage Authentication CodesUnconditionally Secure MACsNotes and ReferencesExercisesTHE RSA CRYPTOSYSTEM AND FACTORING INTEGERSIntroduction to Public-key CryptographyMore Number TheoryThe RSA CryptosystemPrimality TestingSquare Roots Modulo nFactoring AlgorithmsOther Attacks on RSAThe Rabin CryptosystemSemantic Security of RSANotes and ReferencesExercisesPUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMSThe ElGamal CryptosystemAlgorithms for the Discrete Logarithm ProblemLower Bounds on the Complexity of Generic AlgorithmsFinite FieldsElliptic CurvesDiscrete Logarithm Algorithms in PracticeSecurity of ElGamal SystemsNotes and ReferencesExercisesSIGNATURE SCHEMESIntroductionSecurity Requirements for Signature SchemesThe ElGamal Signature SchemeVariants of the ElGamal Signature SchemeProvably Secure Signature SchemesUndeniable SignaturesFail-stop SignaturesNotes and ReferencesExercisesPSEUDO-RANDOM NUMBER GENERATIONIntroduction and ExamplesIndistinguishability of Probability DistributionsThe Blum-Blum-Shub GeneratorProbabilistic EncryptionNotes and ReferencesExercisesIDENTIFICATION SCHEMES AND ENTITY AUTHENTICATIONIntroductionChallenge-and-Response in the Secret-Key SettingChallenge-and-Response in the Public-Key SettingThe Schnorr Identification SchemeThe Okamoto Identification SchemeThe Guillou-Quisquater Identification SchemeNotes and ReferencesExercisesKEY DISTRIBUTIONIntroductionDiffie-Hellman Key PredistributionUnconditionally Secure Key PredistributionKey Distribution PatternsSession Key Distribution SchemesNotes and ReferencesExercisesKEY AGREEMENT SCHEMESIntroductionDiffie-Hellman Key AgreementMTI Key Agreement SchemesKey Agreement Using Self-Certifying KeysEncrypted Key ExchangeConference Key Agreement SchemesNotes and ReferencesExercisesPUBLIC-KEY INFRASTRUCTUREIntroduction: What is a PKI?CertificatesTrust ModelsThe Future of PKI?Identity-Based CryptographyNotes and ReferencesExercisesSECRET SHARING SCHEMESIntroduction: The Shamir Threshold SchemeAccess Structures and General Secret SharingInformation Rate and Construction of Efficient SchemesNotes and ReferencesExercisesMULTICAST SECURITY AND COPYRIGHT PROTECTIONIntroduction to Multicast SecurityBroadcast EncryptionMulticast Re-KeyingCopyright ProtectionTracing Illegally Redistributed KeysNotes and ReferencesExercisesFURTHER READINGBIBLIOGRAPHYINDEX

1584885084 (hardcover : acidfree paper) 9781584885085


Coding theory.
Cryptography.

005.82 / S8597