Skip navigation
Title: Understanding Cryptography
Other Titles: A Textbook for Students and Practitioners
Authors: Paar, Christof
Keywords: Cryptography
Understanding Cryptography
Issue Date: 2010
Publisher: Springer
Abstract: Cryptography has crept into everything, from Web browsers and e-mail programs to cell phones, bank cards, cars and even into medical implants. In the near fu- ture we will see many new exciting applications for cryptography such as radio frequency identification (RFID) tags for anti-counterfeiting or car-to-car commu- nications (we’ve worked on securing both of these applications). This is quite a change from the past, where cryptography had been traditionally confined to very specific applications, especially government communications and banking systems. As a consequence of the pervasiveness of crypto algorithms, an increasing number of people must understand how they work and how they can be applied in prac- tice. This book addresses this issue by providing a comprehensive introduction to modern applied cryptography that is equally suited for students and practitioners in industry.
Description: Our book provides the reader with a deep understanding of how modern cryp- tographic schemes work. We introduce the necessary mathematical concepts in a way that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or begin- ning graduate classes, or as a reference book for practicing engineers and computer scientists who are interested in a solid understanding of modern cryptography. The book has many features that make it a unique source for practitioners and stu- dents. We focused on practical relevance by introducing most crypto algorithms that are used in modern real-world applications. For every crypto scheme, up-to-date se- curity estimations and key length recommendations are given. We also discuss the important issue of software and hardware implementation for every algorithm. In addition to crypto algorithms, we introduce topics such as important cryptographic protocols, modes of operation, security services and key establishment techniques. Many very timely topics, e.g., lightweight ciphers which are optimized for con- strained applications (such as RFID tags or smart cards) or new modes of operations, are also contained in the book.
URI: http://localhost:8080/xmlui/handle/123456789/89
ISBN: 978-3-642-04101-3
Appears in Collections:ARTS & SCIENCE

Files in This Item:
File Description SizeFormat 
2010_Book_UnderstandingCryptography.pdf2.64 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.