Now for a
limited time:

Electronics clearance.
| |
|
|
Customers who bought this book also bought:
Editorial Reviews
Book News, Inc. A hefty handbook for both novices and experts, introducing practical aspects of conventional and public-key cryptography and offering information on the latest techniques and algorithms in the field. Mathematical treatments accompany practical discussions of areas including pseudorandom bits and sequences, stream and block ciphers, hash functions, and digital signatures. Also covers establishment protocols, implementation, and patents and standards. Includes annotated chapter references, and cross-referencing between chapters, plus a bibliography of papers from selected cryptographic forums. -- Copyright © 1999 Book News, Inc., Portland, OR All rights reserved
Book Description Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by... read more
See all editorial reviews...
Customer Reviews
Avg. Customer Review:
Write an online review and share your thoughts with other customers.
4 of 4 people found the following review helpful:
Excellent reference indeed, September 27, 2001
Reviewer:
optimistix
(see more about me)
from Bangalore, India
If you're going to work in the area of Cryptography, you can't afford to neglect this book. We used this in a course, and even though it's a handbook, it doubles up pretty well as a textbook, since it has all the underlying mathematical theory, presented in a clear and concise manner. For sheer breadth and depth of coverage, this book is unmatched in the field. It may not have enough on some topics to satisfy everyone, but then i suspect most such topics were not so prominent in 1996, which is when the book was written. Starting with number theory, it goes on cover pseudorandom bits and sequences, stream and block ciphers, hash functions, and digital signatures, establishment protocols, implementation, patents and standards - you name it, you got it. On the one hand, there's enough theory to make you wonder whether it should be called 'applied', but then it indeed qualifies as implementations are discussed as well. And of course, there's an exhaustive bibliography, with more pointers to the literature than one could possibly follow up. One word of caution, though : it requires hard work. If you want a more 'relaxed' coverage of comparable breadth (but not depth), you can do worse than look up Bruce Schneier's 'Applied Crypography', which is a delightful read, but nowhere as rigorous (read academic) as this one. All in all, this is an indispensable reference for those in the field - rigorous and exhaustive, yet eminently readable. If you still haven't made your mind up, here's one final piece of advice : visit the authors'(rather the book's) website, where you'll get the implementations of all the algorithms in the book, and a (presumably) pleasant surprise :-)
4 of 4 people found the following review helpful:
Not for the faint of heart., January 18, 2001
Reviewer:
unicityd
from CA United States
This book is a wonderful reference for any student or professional seriously interested in cryptography. The book is intended for people people who already have a strong background in math and/or computer science; the faint of heart should steer clear. For a chattier introduction, refer to Schneier's "Applied Cryptography."
22 of 32 people found the following review helpful:
Shucks! No in depth discussion of elliptic curve crypto!!!, September 10, 1999
Reviewer:
Lee D Carlson
(see more about me)
from Global Mathematics, Inc (St.Louis, MO)
A disappointing book for those who expected a discussion of elliptic curve cryptography. I bought this book "blind" (from Amazon without first perusing it in a library) and so did not know what to expect. The authors spend one paragraph on elliptic curves and state that an in-depth discussion of such is beyond the scope of the book. The book is however a very good one for discussing most of the other approaches to cryptography. A serious student/practioner of cryptography should have this on his/her shelf, but supplemented by some of the other books on elliptic curve cryptography. The authors could no doubt write a second edition of this book which includes a discussion of elliptic curve cryptography. The handbook would then become a "Bible" of cryptographic specialists. -From a worshipper of elliptic curves.
13 of 92 people found the following review helpful:
Konusunda yazılmış derli toplu tek kitap (in Turkish), July 20, 1999
Reviewer:
adem@alaeddin.cc.selcuk.edu.tr
from Konya, Turkey
Kitap biraz daha açıklamalı ve örnekler verilerek zenginleştirilebilir. Konuların akış sırası alışılmışın dışında.
See all customer reviews...
Customers who bought titles by Alfred J. Menezes also bought titles by these authors:
Auctions and zShops sellers and our other stores recommend:
Listmania!
Look for similar books by subject:
Browse for books in:
Subjects
> Science
> Mathematics
> General
Subjects
> Computers & Internet
> Programming
> Algorithms
> Cryptography
Subjects
> Computers & Internet
> Programming
> Algorithms
> General
Subjects
> Reference
> General
New & Used Textbooks
> Computer Science & Information Systems
> Algorithms
New & Used Textbooks
> Sciences
> Mathematics
> General
-
I have read this book, and I want to review it.
- Correct errors and omissions in this listing.
- Is there a specific product you'd like us to sell?
Tell us about it.
|