Skip to main content Accessibility help
×
    Show more authors
  • You may already have access via personal or institutional login
  • Select format
  • Publisher:
    Cambridge University Press
    Publication date:
    July 2014
    March 2014
    ISBN:
    9781139084772
    9781107017887
    9781107603455
    Dimensions:
    (228 x 152 mm)
    Weight & Pages:
    0.42kg, 186 Pages
    Dimensions:
    (228 x 152 mm)
    Weight & Pages:
    0.3kg, 186 Pages
You may already have access via personal or institutional login
  • Selected: Digital
    Add to cart View cart Buy from Cambridge.org

    Book description

    Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.

    Refine List

    Actions for selected content:

    Select all | Deselect all
    • View selected items
    • Export citations
    • Download PDF (zip)
    • Save to Kindle
    • Save to Dropbox
    • Save to Google Drive

    Save Search

    You can save your searches here and later view and run them again in "My saved searches".

    Please provide a title, maximum of 40 characters.
    ×

    Contents

    Further Reading
    [1] E.T., Bell. Men of Mathematics. New York, NY: Simon and Schuster (1937).
    [2] David, Kahn. The Codebreakers: The Story of Secret Writing, 2nd ed. New York, NY: Scribner (1996).
    [3] Peter, Wright with Paul, Greengrass. Spycatcher: The Candid Autobiography of a Senior Intelligence Officer. New York, NY: Viking (1987).
    [4] Charlie, Kaufman, Radia, Perlman, and Mike, Speciner. Network Security: Private Communication in a Public World. Englewood Cliffs, NJ: Prentice-Hall (1995).
    [5] Bruce, Schneier. Applied Cryptography, 2nd ed. New York, NY: John Wiley & Sons (1996).
    [6] Douglas R., Stinson. Cryptography: Theory and Practice. Boca Raton, FL: CRC Press (1995).

    Metrics

    Altmetric attention score

    Full text views

    Total number of HTML views: 0
    Total number of PDF views: 0 *
    Loading metrics...

    Book summary page views

    Total views: 0 *
    Loading metrics...

    * Views captured on Cambridge Core between #date#. This data will be updated every 24 hours.

    Usage data cannot currently be displayed.

    Accessibility standard: Unknown

    Why this information is here

    This section outlines the accessibility features of this content - including support for screen readers, full keyboard navigation and high-contrast display options. This may not be relevant for you.

    Accessibility Information

    Accessibility compliance for the PDF of this book is currently unknown and may be updated in the future.