• Statt: EUR 83,67
  • Sie sparen: EUR 2,66 (3%)
  • Alle Preisangaben inkl. MwSt.
Nur noch 7 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon.
Geschenkverpackung verfügbar.
Menge:1
Introduction to Modern Cr... ist in Ihrem Einkaufwagen hinzugefügt worden
Gebraucht: Gut | Details
Verkauft von Warehouse Deals
Zustand: Gebraucht: Gut
Kommentar: Gelesene Ausgabe in gutem, sauberen Zustand. Seiten und Einband sind intakt (ebenfalls der Schutzumschlag, falls vorhanden). Buchrücken darf Gebrauchsspuren aufweisen. Notizen oder Unterstreichungen in begrenztem Ausmaß sowie Bibliotheksstempel sind zumutbar. Amazon-Kundenservice und Rücknahmegarantie (bis zu 30 Tagen) bei jedem Kauf.
Ihren Artikel jetzt
eintauschen und
EUR 11,41 Gutschein erhalten.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Anhören Wird wiedergegeben... Angehalten   Sie hören eine Probe der Audible-Audioausgabe.
Weitere Informationen
Alle 2 Bilder anzeigen

Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/Crc Cryptography and Network Security Series) (Englisch) Gebundene Ausgabe – 31. August 2007

4 Kundenrezensionen

Alle 2 Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Amazon-Preis Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Gebundene Ausgabe
"Bitte wiederholen"
EUR 81,01
EUR 80,67 EUR 30,35
4 neu ab EUR 80,67 5 gebraucht ab EUR 30,35

Dieses Buch gibt es in einer neuen Auflage:


Hinweise und Aktionen

  • Große Hörbuch-Sommeraktion: Entdecken Sie unsere bunte Auswahl an reduzierten Hörbüchern für den Sommer. Hier klicken.


Wird oft zusammen gekauft

Introduction to Modern Cryptography: Principles and Protocols (Chapman & Hall/Crc Cryptography and Network Security Series) + Understanding Cryptography: A Textbook for Students and Practitioners
Preis für beide: EUR 118,21

Die ausgewählten Artikel zusammen kaufen
Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

  • Gebundene Ausgabe: 534 Seiten
  • Verlag: Chapman & Hall; Auflage: 1 (31. August 2007)
  • Sprache: Englisch
  • ISBN-10: 1584885513
  • ISBN-13: 978-1584885511
  • Größe und/oder Gewicht: 24,2 x 16,4 x 3,4 cm
  • Durchschnittliche Kundenbewertung: 4.8 von 5 Sternen  Alle Rezensionen anzeigen (4 Kundenrezensionen)
  • Amazon Bestseller-Rang: Nr. 115.012 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
  • Komplettes Inhaltsverzeichnis ansehen

Mehr über die Autoren

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Pressestimmen

This book is a comprehensive, rigorous introduction to what the authors name 'modern' cryptography ... a novel approach to how cryptography is taught, replacing the older, construction-based approach. ... The concepts are clearly stated, both in an intuitive fashion and formally. ... I would heartily recommend this book to anyone who is interested in cryptography. ... the exercises are challenging and interesting, and can benefit readers of all academic levels. ... -IACR book reviews, January 2010 Over the past 30 years, cryptography has been transformed from a mysterious art into a mathematically rigorous science. The textbook by Jonathan Katz and Yehuda Lindell finally makes this modern approach to cryptography accessible to a broad audience. Readers of this text will learn how to think precisely about the security of protocols against arbitrary attacks, a skill that will remain relevant and useful regardless of how technology and cryptography standards change. The book uses just enough formalism to maintain precision and rigor without obscuring the development of ideas. It manages to convey both the theory's conceptual beauty and its relevance to practice. I plan to use it every time I teach an undergraduate course in cryptography. -Salil Vadhan, Harvard University, Cambridge, Massachusetts, USA ... the greatest attribute is the fact that the material is presented in such a unified way. These are not just a collection of topics from cryptography, thrown together at random. One topic leads effortlessly to the next. As such, this is a virtually indispensible resource for modern cryptography. -Donald L. Vestal, South Dakota State University, MAA Online, July 2008 ... gives an excellent introduction to the theoretical background of cryptography. It would be a fine textbook for an advanced undergraduate (or graduate) course in theoretical computer science for students who have already seen the rudiments of cryptography. It will be a valuable reference for researchers in the field ... -Steven D. Galbraith, Mathematical Reviews, 2009b The book is highly recommended as a textbook in cryptography courses at graduate or advanced undergraduate levels ... covers in a splendid way the main notions of current cryptography from the point of view of information-theoretical security. This corresponds indeed to a modern cryptography approach. -Guillermo Morales-Luna, Zentralblatt MATH, Vol. 1143

Synopsis

Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. "Introduction to Modern Cryptography" provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs. The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives.The second half of this book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, this book concludes with a discussion of the random oracle model and its applications.

Serving as a textbook, a reference, or for self-study, "Introduction to Modern Cryptography" presents the necessary tools to fully understand this fascinating subject.


Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


In diesem Buch

(Mehr dazu)
Ausgewählte Seiten ansehen
Buchdeckel | Copyright | Inhaltsverzeichnis | Auszug | Stichwortverzeichnis | Rückseite
Hier reinlesen und suchen:

Kundenrezensionen

4.8 von 5 Sternen
5 Sterne
3
4 Sterne
1
3 Sterne
0
2 Sterne
0
1 Sterne
0
Alle 4 Kundenrezensionen anzeigen
Sagen Sie Ihre Meinung zu diesem Artikel

Die hilfreichsten Kundenrezensionen

1 von 1 Kunden fanden die folgende Rezension hilfreich Von Irgend Wer am 19. Februar 2013
Format: Gebundene Ausgabe Verifizierter Kauf
Es gibt viele Textbücher über Kryptographie - leider gibt es darunter auch viele mäßge Bücher mit Fehlern. Zum Beispiel wird in vielen Büchern das naive RSA-Verfahren ohne Warnung präsentiert.

Das Buch gibt eine recht mathematiklastige Einführung und beschäftigt sich insbesondere mit mathematischen Sicherheitsnachweisen, setzt dabei aber nur sehr grundlegende Mathematikkenntnisse voraus, und führt den Leser zu Anfang recht behutsam in das Thema ein. Man merkt die didaktische Erfahrung der Autoren.

Der Fokus liegt definitiv auf der Theorie. Als Einführung in das Thema bzw. vorlesungsbegleitendes Material ist dieses Buch sicher gut geeignet. Praktische Aspekte, wie zum Beispiel Implementationen und Netzwerkprotokolle werden nicht thematisiert, es werden aber entsprechende Referenzen genannt. Für Interessierte empfiehlt es sich also gegebenenfalls zusätzlich ein Buch über Netzwerksicherheit. Vermisst habe ich weiterhin ein Kaptiel ueber elliptische Kurven.

Insgesamt 5 von 5 Sternen, da nach meinem Kenntnisstand kein besseres einführendes Material zur Kryptographie existiert.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
3 von 4 Kunden fanden die folgende Rezension hilfreich Von Evelyn Spitzwieser am 27. November 2009
Format: Gebundene Ausgabe
Ich habe das Buch begleitend für meine Vorlesungen zur Kryptographie gekauft, und es hat mir dabei schon sehr geholfen...Allerdings könnte es etwas ansprechender aufgemacht sein. Auch als Einsteigerlektüre ist es nicht zu empfehlen
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Format: Gebundene Ausgabe Verifizierter Kauf
Eine ausführliche, gründliche und mathematisch saubere Einführung in die moderne Kryptographie, zumindest in die theoretische Seite. Als Lektüre zu einer Einführungsvorlesung in die Kryptographie gut geeignet.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Format: Gebundene Ausgabe Verifizierter Kauf
Sehr hilfreiches Buch, insbesondere wenn die Vorlesung genau darauf aufbaut. Und auch wenn es schon ein paar Jahre alt ist noch nicht veraltet.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback. Wenn diese Rezension unangemessen ist, informieren Sie uns bitte darüber.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 9 Rezensionen
36 von 37 Kunden fanden die folgende Rezension hilfreich
The definitive guide to Cryptography 26. September 2007
Von Vincenzo - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
I used this book for a course on modern cryptography held by Prof. Persiano of the University of Salerno, Italy.
I read, consulted, and studied other books about cryptography, but 'INTRODUCTION TO MODERN CRYPTOGRAPHY' by Katz and Lindell is in my humble opinion THE BEST.
The book has a theoretical flavor, it is mathematically rigorous, but it is very readable and fluent, and presents the motivating discussions beneath each topic.
The book is fully self-contained, and gives the necessary background for each topic (for example there is a lot of basic computational number theory necessary for introducing the topic of 'public key').
The beauty of the book is in that the authors don't present a collection of protocols, with no links each other, but the flow is sequential and motivated (in contrast to books which present topics only for filling the pages).
All the theorems are proved and the treatment is rigorous, but the theory is developed from scratch, and the book is oriented to beginner students, though it presents also advanced stuff and is one of the most advanced book for beginners.
The main contents of the book are:

1) Perfect security and Shannon's theorem (information theoretic security)
2) Computational security, indistinguishability, CPA
3) Pseudorandomness
4) One-way functions, hard-core predicate, Levin's theorem
5) Message Authentication Codes
6) Costructions of Pseudorandom objects, AES, Substitution-Permutation networks
7) Relation between Private-Key, one-way functions and pseudrandomness.
8) Number theory for the cryptography
9) Computational number theory, factorization, square roots,discrete log,diffie-hellman problems
10) Public key, goldwasser-micali, el gamal, pallier, hybrid encryption, encryption schemes based on trapdoor permutations
11)Digital Signature Schemes
I wrote only some topics of the book following my taste, but the books contains much more.
The exercises left to the end of each chapters are good, and vary from easy to hard.
The book i read was in draft form, 320 pages long, but the final edition is about 500 pages long, cause addictional sections have been added.
Indeed in the introduction of my book the authors write that their planned to add to the final edition the following:

Elliptic curves
Sub-exponential factoring algorithms
The random oracle model and efficient cryptographic constructions
Protocols

Given that the final edition is 200 pages longer that my draft i think that these sections have been added.

I advice this book to everyone who wants start the study of modern cryptography from a theoretic and rigorous point of view.
After you read Katz and Lindell i suggest you to read "Foundations of Cryptography" by Goldreich, but it is too advanced and its reading requires you already read Katz and Lindell.
1 von 1 Kunden fanden die folgende Rezension hilfreich
Structured, Coherent, Rigorous foundations of Cryptography with also emphasis on Application, Implementation, and Practice 16. Mai 2011
Von Raef B. Youssef - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
It was very nice to see how security would be possibly defined in a sense different from (and more relaxed than) information-theoretic secrecy. It was nice to see how different definitions would lead to different levels of security, or in other words, each definition gives a guarantee of security against a certain class of real-life security threats (or attacks) and takes also into account very practical issues like dealing with computationally bounded adversaries. Moreover, introducing the notion of security using those definitions made the whole setting, not only mathematically rigorous, but also coherent, structured, and well-founded, without losing contact with practical concerns and real-life scenarios. Even more, this setting gave a neat and mathematically sound way to attain a proven notion of security rather than just introducing or suggesting schemes that show "good" performance in practice without being able to say anything, or quantify the security they provide on a more fundamental level. Another thing I also liked very much and is related to the point above, is how the book moves on to the point where it was shown that the provable security of almost (if not all) the encryption schemes (either private-key or public-key based) as well as authentication codes and signature schemes is based on the corner stone assumption of existence of one-way functions (one-way permutations). It was very elegant the way a one-way function (permutation) was defined and the way it is used to prove security in one sense or the other. It fits in very well in the development of the theory and made the whole structure very homogeneous. That is why Chapter 6, in my opinion, was one of the most important chapters that set the foundations of attaining provable security and build the bridge between assumptions and theory (one-way functions and hardcore predicates) on one side and practice on the other (pseudo-random generators and pseudo-random functions).Finally, public-key encryption schemes and digital signatures are also, definitely, on my long favorites list of this book. It was very exciting and intellectually stimulating to read how these schemes work and how they are (or most of them at least) shown to be secure in one sense or the other (i.e., attaining provable security ). Actually, it was useful to me to know all these practical issues related to these schemes like implementation and design issues of El Gamal and the (padded) RSA schemes, as well as the practical considerations that set many differences between private and public key encryption schemes. The same is also true with digital signatures. Also, discussing various real-life attacks (especially those against schemes that are widely used in cryptographic standards like the padded RSA and El Gamal schemes) was a very important ingredient that made the whole material in this book interesting and very engaging.
10 von 14 Kunden fanden die folgende Rezension hilfreich
IMHO Best Book on Cryptography 19. April 2009
Von tech book reader - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe
This is a fantastic book, it was mandatory reading as part of my Masters in Information Security. I found it invaluable in understanding this seemingly 'mind-bending' subject.

I've bought numerous books on Crypto - however, this is the only one I've found that gets the balance between the maths and core principles/motivations spot on! I can't recommend this book enough, IMHO it's essential reading if you're pursuing a career in Information Security.
1 von 1 Kunden fanden die folgende Rezension hilfreich
Excellent book if you are serious about cryptography 24. März 2014
Von traveler - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
It is not a casual read. It does not have little pieces of code you can program. It will change how you think.

This was a recommended optional book for a class I took on cryptography. The class was really challenging and changed how I look at things. The class was like a super compressed version of this book. For this reason it is nice to have.

Even though the class is over I am still working through the book.

You will discover that in modern cryptography there are a number of constructs that a useful encryption system must pass. When looked at in this way a number of encryption schemes are vulnerable and you will understand why. You will discover standards are not all good; that good standards can be are flawed by poor usage; and that you do not want to write your own.

You will gain confidence in how your data is encrypted. Best of all when you read someone's paper you will know what they are saying with all those little symbols and theorems.
1 von 1 Kunden fanden die folgende Rezension hilfreich
Amazing book! 21. Juni 2012
Von Evgeniy - Veröffentlicht auf Amazon.com
Format: Gebundene Ausgabe Verifizierter Kauf
This is very interesting and useful book especially for students and other people who wanna know about Provable Security (and Information Theory) approach in modern cryptography.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.