0% found this document useful (0 votes)
57 views

Understanding Cryptography - SpringerLink

Uploaded by

nganpt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Understanding Cryptography - SpringerLink

Uploaded by

nganpt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Understanding Cryptography | SpringerLink 5/11/20, 09:55

Understanding Cryptography

A Textbook for Students and Practitioners


Authors
(view affiliations)

Christof Paar
Jan Pelzl

Textbook

281 Citations
28 Mentions
1.5m Downloads

Chapters
About

Table of contents
1. Front Matter
Pages i-xviii
PDF
2. Introduction to Cryptography and Data Security
Christof Paar, Jan Pelzl
Pages 1-27
PDF
3. Stream Ciphers
Christof Paar, Jan Pelzl
Pages 29-54
PDF
4. The Data Encryption Standard (DES) and Alternatives
Christof Paar, Jan Pelzl
Pages 55-86
PDF
5. The Advanced Encryption Standard (AES)
Christof Paar, Jan Pelzl
Pages 87-121
PDF

https://link.springer.com/book/10.1007/978-3-642-04101-3 Page 1 of 4
Understanding Cryptography | SpringerLink 5/11/20, 09:55

6. More About Block Ciphers


Christof Paar, Jan Pelzl
Pages 123-148
PDF
7. Introduction to Public-Key Cryptography
Christof Paar, Jan Pelzl
Pages 149-171
PDF
8. The RSA Cryptosystem
Christof Paar, Jan Pelzl
Pages 173-204
PDF
9. Public-Key Cryptosystems Based on the Discrete Logarithm Problem
Christof Paar, Jan Pelzl
Pages 205-238
PDF
10. Elliptic Curve Cryptosystems
Christof Paar, Jan Pelzl
Pages 239-257
PDF
11. Digital Signatures
Christof Paar, Jan Pelzl
Pages 259-292
PDF
12. Hash Functions
Christof Paar, Jan Pelzl
Pages 293-317
PDF
13. Message Authentication Codes (MACs)
Christof Paar, Jan Pelzl
Pages 319-330
PDF
14. Key Establishment
Christof Paar, Jan Pelzl
Pages 331-357
PDF
15. Back Matter
Pages 359-372
PDF

About this book

Introduction

Cryptography is now ubiquitous – moving beyond the traditional environments, such as


government communications and banking systems, we see cryptographic techniques
realized in Web browsers, e-mail programs, cell phones, manufacturing systems,

https://link.springer.com/book/10.1007/978-3-642-04101-3 Page 2 of 4
Understanding Cryptography | SpringerLink 5/11/20, 09:55

embedded software, smart buildings, cars, and even medical implants. Today's designers
need a comprehensive understanding of applied cryptography.

After an introduction to cryptography and data security, the authors explain the main
techniques in modern cryptography, with chapters addressing stream ciphers, the Data
Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block
ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm
problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message
Authentication Codes (MACs), and methods for key establishment, including certificates
and public-key infrastructure (PKI). Throughout the book, the authors focus on
communicating the essentials and keeping the mathematics to a minimum, and they
move quickly from explaining the foundations to describing practical implementations,
including recent topics such as lightweight ciphers for RFIDs and mobile devices, and
current key-length recommendations.

The authors have considerable experience teaching applied cryptography to engineering


and computer science students and to professionals, and they make extensive use of
examples, problems, and chapter reviews, while the book’s website offers slides, projects
and links to further resources. This is a suitable textbook for graduate and advanced
undergraduate courses and also for self-study by engineers.

Keywords

AES Applied cryptography Crib Cryptography Cryptology DES Data security


Hash functions Key establishment Lightweight ciphers
Message Authentication Code Public-key infrastructure (PKI) RFID ants
hash function
Authors and affiliations

Christof Paar (1)


Jan Pelzl (2)

1. Fak. Elektrotechnik und, Informationstechnik, Universität Bochum, , Bochum,


Germany
2. Fak. Elektrotechnik und, Informationstechnik, Universität Bochum, , Bochum,
Germany

Bibliographic information

DOI https://doi.org/10.1007/978-3-642-04101-3
Copyright Information Springer-Verlag Berlin Heidelberg 2010
Publisher Name Springer, Berlin, Heidelberg
eBook Packages Computer Science
Print ISBN 978-3-642-44649-8
Online ISBN 978-3-642-04101-3
Buy this book on publisher's site

https://link.springer.com/book/10.1007/978-3-642-04101-3 Page 3 of 4
Understanding Cryptography | SpringerLink 5/11/20, 09:55

© 2019 Springer Nature Switzerland AG. Part of Springer Nature.

Not logged in Not affiliated 113.20.109.66

https://link.springer.com/book/10.1007/978-3-642-04101-3 Page 4 of 4

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy