...an encyclopedic work of a very high standard. ... More than merely a book that describes cryptographic codes, scattered throughout this book are pictures and biographies of key personnel responsible for progressing the world's knowledge and use of codes, as well as exercises and problems ... This is, without question, an excellent book. ... the depth of the knowledge, the provided mathematical background, and simply the correctness and consistency of symbols throughout, all give indications of the quality and amount of work that has gone into this book. ... the book is probably the best book currently for the range of users. -IACR book reviews, May 2010 It is an excellent book with unique features including more than 370 exercises... -The Cryptogram, Vol. LXXI, No. 5, September-October 2005 This is an interesting, entertaining and well-composed book. ... It was a good idea to collect all exercises in the Appendix G as it makes reading easier for a general reader, while enabling university and college faculty to use the book in teaching courses in cryptography and cryptoanalysis. To conclude it is worth mentioning that all sections of the book are decorated with beautiful quotations. -Mathematical Reviews It is full of engaging detail on the many personalities that have been drawn to this branch of applied mathematics. ... a self-contained guide to the subject covering material from basic arithmetic to the foundations of group theory and probability. ... Among books at the level, this one stands out for some of its vivid examples. Particularly enlightening is the discussion of quantum computing: rather than merely touching on the subject, Mollin provides a particularly illustrative and detailed example. -MAA Reviews, Dec. 2005 Richard Mollin has written many books ... on cryptography for readers at many levels. I found this to be his most approachable work, and perhaps one of his most educational. -SIGACT News

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist.The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion.Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.
Les mer
Explores the depth and breadth of the field of cryptology. This title begins by tracing the development of cryptology from inception to modern-day practice. It also explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, and advanced applications.
Les mer
From the Riddles of Ancient Egypt to Cryptography in the Renaissance-3,500 Years in the Making. From Sixteenth-Century Cryptography to the New Millennium-The Last 500 Years. Symmetric-Key Cryptography. Public-Key Cryptography. Cryptographic Protocols. Key Management. Message Authentication. Electronic Mail and Internet Security. Applications and the Future. Non-Cryptographic Security Issues. Information Theory and Coding. Appendix A: Mathematical Facts. Appendix B: Pseudo-Random Number Generation. Appendix C: Factoring Large Integers. Appendix D: Technical and Advanced Details. Appendix E: Probability Theory. Appendix F: Recognizing Primes. Appendix G: Exercises. Bibliography. List of Symbols. Index.
Les mer

Produktdetaljer

ISBN
9781584884705
Publisert
2005-05-24
Utgiver
Vendor
Chapman & Hall/CRC
Vekt
1088 gr
Høyde
234 mm
Bredde
156 mm
Aldersnivå
P, 06
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
700

Forfatter

Biographical note

Mollin, Richard A.