By Jonathan Katz, Yehuda Lindell
June 24, 2025
Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment of this fascinating subject. This is an updated edition of the most widely used introduction to cryptography textbook. The authors have kept this ...
By Kristian Gjøsteen
August 26, 2024
Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential ...
By Craig Bauer
August 26, 2024
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the ...
By Douglas Robert Stinson
August 26, 2024
Techniques for Designing and Analyzing Algorithms Design and analysis of algorithms can be a difficult subject for students due to its sometimes-abstract nature and its use of a wide variety of mathematical tools. Here the author, an experienced and successful textbook writer, makes the subject as...
By Jonathan Katz, Yehuda Lindell
December 21, 2020
Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal ...
By Craig Bauer
May 20, 2020
Eschewing the often standard dry and static writing style of traditional textbooks, Discrete Encounters provides a refreshing approach to discrete mathematics. The author blends traditional course topics and applications with historical context, pop culture references, and open problems. This book ...
By Richard Klima, Richard E. Klima, Neil P. Sigmon, Neil Sigmon
November 26, 2018
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and ...
Edited
By Nadia El Mrabet, Marc Joye
December 13, 2016
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite ...
By Maria Isabel González Vasco, Rainer Steinwandt
March 31, 2015
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential ...
By Lidong Chen, Guang Gong
June 28, 2012
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in ...
Edited
By Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena
February 17, 2012
Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing ...
Edited
By Burton Rosenberg
August 09, 2010
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment ...