From this page you can:
Home |
Descriptors



Cryptography engineering / Niels Ferguson
Title : Cryptography engineering : design principles and practical applications Material Type: printed text Authors: Niels Ferguson, Author ; Bruce Schneier, Author Publisher: Indianapolis, IN : Wiley Pub. Inc Publication Date: 2010 Pagination: xxix, 353 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-470-47424-2 General note: Includes bibliographical references (p. 327)
Includes index (p. 339)Languages : English (eng) Original Language : English (eng) Descriptors: Computer security
CryptographyClass number: 005.82 Abstract: Learn to build cryptographic protocols that work in the real world. Knowing how a camera works does not make you a great photographer. Knowing what cryptographic designs are and how existing cryptographic protocols work does not give you proficiency in using cryptography. You must learn to think like a cryptographer.
That is what this book will teach you. Dive deeply into specific, concrete cryptographic protocols and learn why certain decisions were made. Recognize the challenges and how to overcome them. With this book, which is suitable for both classroom and self study, you will learn to use cryptography effectively in real-world systems.
1. Understand what goes into designing cryptographic protocols
2. Develop an understanding of the interface between cryptography and the surrounding system, including people, economics, hardware, software, ethics, policy, and other aspects of the real world.
3. Look beyond the security protocol to see weaknesses in the surrounding system
4. Thwart the adversary by understanding how adversaries think
5. Learn how to build cryptography into new productsContents note: Introduction; The context of cryptography; Introduction to cryptography; Message security; Block ciphers; Block cipher modes; Hash functions; Message authentication codes; The secure channel; Implementation issues; Key negotiation; Generating randomness; Primes; Diffie-Hellman; RSA; Introduction to Cryptographic Protocols; Key Negotiation; Implementation Issues; Key management; The clock; Key servers; The dream of PKI; PKI reality; PKI practicalities; Storing secrets; Miscellanious; Standards and Patents; Involving experts. Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17101 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-002442 005.82 Fer-Cry 2010 General Collection SEEU Library Skopje English Due for return by 01/20/2020 Introduction to cryptography / Wade Trappe
Title : Introduction to cryptography : with coding theory Material Type: printed text Authors: Wade Trappe, Author ; Lawrence C. Washington, Author Edition statement: 2nd ed Publication Date: 2005 Pagination: xiv, 577 p. Size: 24 cm ISBN (or other code): 978-0-13-186239-5 General note: Includes bibliographical references (p.565-570) and index Languages : English (eng) Original Language : English (eng) Descriptors: Coding theory
CryptographyClass number: 005.8 Abstract: This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and demonstrate important concepts. A full chapter on error correcting codes introduces the basic elements of coding theory. Other topics covered: Classical cryptosystems, basic number theory, the data encryption standard, AES: Rijndael, the RSA algorithm, discrete logarithms, digital signatures, e-commerce and digital cash, secret sharing schemes, games, zero knowledge techniques, key establishment protocols, information theory, elliptic curves, error correcting codes, quantum cryptography. For professionals in cryptography and network security. Contents note: Overview of Cryptography and its Applications; Classical Cryptosystems; Basic Number Theory; The Data Encryption Standard; The Advanced Encryption Standard: Rijndael; The RSA Algorithm; Discrete Logarithms; Hash Functions; Digital Signatures; Security Protocols; Digital Cash; Secret Sharing Schemes; Games; Zero-Knowledge Techniques; Information Theory; Elliptic Curves; Lattice Methods; Error Correcting Codes; Quantum Techniques in Cryptography; Mathematica® Examples; MATALB® Examples. Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=14642 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-000916 005.8 Tra-Int 2005 General Collection Library "Max van der Stoel" English Available 1702-000917 005.8 Tra-Int 2005 General Collection Library "Max van der Stoel" English Available 1702-001103 005.8 Tra-Int 2005 General Collection Library "Max van der Stoel" English Available Introduction to Modern Cryptography / Jonathan Katz
Title : Introduction to Modern Cryptography : with coding theory Material Type: printed text Authors: Jonathan Katz, Author ; Yehuda Lindell, Author Edition statement: 2nd edition Publisher: Boca Raton : CRC Publication Date: 2015 Pagination: xx, 583 p. Size: 24 cm ISBN (or other code): 978-1-466-57026-9 General note: Includes bibliographical references (p. 563-576)
Includes index (p. 577-583)Languages : English (eng) Original Language : English (eng) Descriptors: Coding theory
CryptographyClass number: 005.8 Abstract: Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and ElGamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes.
Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:
-Stream ciphers and block ciphers, including modes of operation and design principles
-Authenticated encryption and secure communication sessions
-Hash functions, including hash-function applications and design principles
-Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacks
-The random-oracle model and its application to several standardized, widely used public-key encryption and signature schemes
-Elliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIES
Containing updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study.Contents note: Introduction and Classical Cryptography; Perfectly Secret Encryption; Private-Key (Symmetric) Cryptography; Private-Key Encryption; Message Authentication Codes; Hash Functions and Applications; Practical Constructions of Symmetric-Key Primitives; Theoretical Constructions of Symmetric-Key Primitives; Public-Key (Asymmetric) Cryptography; Number Theory and Cryptographic Hardness Assumptions; Algorithms for Factoring and Computing Discrete Logarithms; Key Management and the Public-Key Revolution; Public-Key Encryption; Digital Signature Schemes; Advanced Topics in Public-Key Encryption; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=16682 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001700 005.8 Kat-Int 2015 General Collection Library "Max van der Stoel" English Available .NET security and cryptography / Peter Thorsteinson
Title : .NET security and cryptography Material Type: printed text Authors: Peter Thorsteinson, Author ; G. Gnana Arun Ganesh, Author Publisher: London : Prentice Hall Publication Date: 2004 Pagination: xvii, 466 p. Layout: ill. Size: 24 cm ISBN (or other code): 978-0-13-100851-9 General note: Includes index (p. 443-466) Languages : English (eng) Original Language : English (eng) Descriptors: Computer security
Cryptography
Microsoft .NETClass number: 005.8 Abstract: Part of the Integrated .NET Series, this book provides a practical and comprehensive treatment on implementing both cryptography and security features on the .NET platform using the C# and VB .NET programming languages. It provides focused and detailed code examples that demonstrate the most important concepts, with commentary on how the code examples work. The book also provides a substantial mathematical and theoretical background on the underlying cryptographic concepts. After reading this book and experimenting with the provided example programs, the reader should have a good understanding of the major cryptographic algorithms and standard cryptographic programming techniques. Readers should also gain a solid understanding of how .NET security works and how to implement user-based and code access security in their own .NET programs. Contents note: NET Cryptography and Security; Fundamentals of Cryptography; Symmetric Cryptography; Asymmetric Cryptography; Digital Signatures; XML Cryptography; NET User-Based Security; NET Code Access Security; ASP.NET Security; Web Services Security; Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=17251 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 1702-001962 005.8 Tho-NET 2004 General Collection Library "Max van der Stoel" English Available The official PGP user's guide / Philip Zimmermann
Title : The official PGP user's guide Material Type: printed text Authors: Philip Zimmermann, Author Publisher: Cambridge, Mass. : MIT Press Publication Date: 1995 Pagination: xiii, 127 p. Size: 23 cm ISBN (or other code): 978-0-262-74017-3 General note: Includes bibliographical references and index Languages : English (eng) Descriptors: Cryptography
Electronic mail systems - Security measures - Data processing
PGP (Computer file)
Telecommunication systems - Security measures - Data processingClass number: 005.82 Record link: https://library.seeu.edu.mk/index.php?lvl=notice_display&id=7479 Hold
Place a hold on this item
Copies
Barcode Call number Media type Location Section Status 5702-011339 005.82 Zim-off 1995 General Collection Library "Max van der Stoel" English Available 5702-011372 005.82 Zim-off 1995 General Collection Library "Max van der Stoel" English Available