Skip to content
Scan a barcode
Scan
Paperback Foundations of Cryptography: Volume 2, Basic Applications Book

ISBN: 052111991X

ISBN13: 9780521119917

Foundations of Cryptography: Volume 2, Basic Applications

(Book #2 in the Foundations of Cryptography Series)

Select Format

Select Condition ThriftBooks Help Icon

Recommended

Format: Paperback

Condition: New

$71.98
Save $0.01!
List Price $71.99
50 Available
Ships within 2-3 days

Book Overview

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptographic Protocols...

Customer Reviews

3 ratings

A must have for people doing research in theoretical crypto

This is a sequel of Foundations of Cryptography, Vol 1, which covers theoretical proofs of signatures, encryptions, and more. The price of $75.00 is a bit prohibitive at the moment, and the contents are a little bit dense to follow, but this is an important book to have if you want to do research in theoretical crypto.

Fundamental book for anyone working with cryptography

This book, that you can see some parts on the authors site, is a essencial on everyone desk working on security and cryptography. It is not a book of recipes of how to build a secure cryptographic environment but a fundamental book on the basics of cryptography and cryptographic protocols.

Superb presentation of the theoretical foundations.

We all know what it means for an algorithm to compute a function, but what does it mean for an encryption scheme to be secure? Traditionally, cryptographic schemes were suggested and attacked based on ad-hoc criterias, for lack of a proper theoretical setting. The last two decades have seen enormous progress in this respect. New notions were devised to harness the computational difficulty of problems in a constructive way to achieve security (in various senses) against all adversaries. This enabled the definition of a host of well-defined cryptographic "objects" and investigation of their existence and relations.The planned 3-volume series aims to provide a thorough presentation of the theory, written by a dominant figure in the field. This first volume introduces the basic notions: one-way functions, pseudorandom generators, various zero-knowledge proof systems and related concepts. Curiously, common cryptographic objects such as encryption schemes and signature schemes are only briefly discussed in an appendix -- the author has chosen to postpone these to the Volume 2 in the interest of in-depth discussion of the simpler objects. Hence this volume does not stand well on its own, and until Volume 2 is published the impatient reader may be disappointed. Fortunately, drafts of Volume 2 are available on-line: www.wisdom.weizmann.ac.il/~oded/foc-vol2.htmlThe presentation style is a tour de force of didactic sensitivity. The subject material is often problematic, because the mental gymnastics required are not quite like any other field. The author is fully aware of this, and provides ample intuitive discussion and motivation to help the reader through the more technical parts (without compromising rigorousness). A clear effort is made to present, or at least mention and reference, all interesting results pertaining to the discussion. This makes the book invaluable as a reference, though it could have been overwhelming had not the author taken care to separate these excursions from the main discussion. The exercises are usually well-considered and rewarding, and unlike some textbooks you won't find important results disguised as an optional exercise.Those interested primarily in practical applications of cryptography may well find this book too abstract and irrelevant; the relation between this book and Schneier's "Applied Cryptography" is roughly like that between organic chemistry and cooking. However, for those taking academic interest in the field or trying to devise novel cryptographic schemes, this book is an effective way to get a solid grasp on the theory, and a delightful way to understand this exciting branch of computer science.
Copyright © 2024 Thriftbooks.com Terms of Use | Privacy Policy | Do Not Sell/Share My Personal Information | Cookie Policy | Cookie Preferences | Accessibility Statement
ThriftBooks® and the ThriftBooks® logo are registered trademarks of Thrift Books Global, LLC
GoDaddy Verified and Secured