Difference between revisions of "Book/Understanding Cryptography"

From PKC
Jump to navigation Jump to search
 
(3 intermediate revisions by 2 users not shown)
Line 15: Line 15:
{{#widget:PDF
{{#widget:PDF
|url=https://crypto-textbook.com/download/Understanding-Cryptography-Chapter1.pdf
|url=https://crypto-textbook.com/download/Understanding-Cryptography-Chapter1.pdf
|width=900
|height=800
|height=800
}}
}}
Web site for this book: http://crypto-textbook.com
Web site for this book: http://crypto-textbook.com
The author, [[Christof Paar]], also has a set of video series<ref>{{:Video/Lecture 1: Introduction to Cryptography by Christof Paar}}</ref> teaching this book.
=Overview(Excerpt from the website)=
=Overview(Excerpt from the website)=
Cryptography has crept into everything, from web browsers and email programs to cell phones, bank cards, cars and even into medical implants. Thus, an increasing number of people have to understand how crypto schemes work and how they can be used in practice. We wanted to create a book that teaches modern applied cryptography to readers with a technical background but without an education in pure mathematics. It is a perfect choice for teaching introductory course in cryptography to engineering and computer science students at the undergraduate or beginning graduate level. Due to its strong focus on practical issues such as standardized ciphers, state-of-the-art security recommendations and implementation issues, the book is also especially useful for practitioners in industry who want to learn about modern security mechanisms.
Cryptography has crept into everything, from web browsers and email programs to cell phones, bank cards, cars and even into medical implants. Thus, an increasing number of people have to understand how crypto schemes work and how they can be used in practice. We wanted to create a book that teaches modern applied cryptography to readers with a technical background but without an education in pure mathematics. It is a perfect choice for teaching introductory course in cryptography to engineering and computer science students at the undergraduate or beginning graduate level. Due to its strong focus on practical issues such as standardized ciphers, state-of-the-art security recommendations and implementation issues, the book is also especially useful for practitioners in industry who want to learn about modern security mechanisms.

Latest revision as of 04:05, 15 January 2024

Paar, Christof; Pelzl, Jan (2010). Understanding Cryptography. local page: Springer. ISBN 978-3-642-04101-3. 

Currently your browser does not use a PDF plugin. You may however download the PDF file instead.

Web site for this book: http://crypto-textbook.com

The author, Christof Paar, also has a set of video series[1] teaching this book.

Overview(Excerpt from the website)

Cryptography has crept into everything, from web browsers and email programs to cell phones, bank cards, cars and even into medical implants. Thus, an increasing number of people have to understand how crypto schemes work and how they can be used in practice. We wanted to create a book that teaches modern applied cryptography to readers with a technical background but without an education in pure mathematics. It is a perfect choice for teaching introductory course in cryptography to engineering and computer science students at the undergraduate or beginning graduate level. Due to its strong focus on practical issues such as standardized ciphers, state-of-the-art security recommendations and implementation issues, the book is also especially useful for practitioners in industry who want to learn about modern security mechanisms.

The book teaches virtually all modern crypto schemes of practical relevance, including the Advanced Encryption Standard (AES), DES and 3DES, RSA, elliptic curves, Diffie-Hellman key exchange, Digital Signature Algorithms, ECDSA and the SHA hash function family. Protocols and key establishment methods, including certificates and public-key infrastructure, are also introduced. Timely topics such as lightweight ciphers for RFIDs and mobile devices are treated as well.

References

  1. Paar, Christof (Jan 30, 2014). Lecture 1: Introduction to Cryptography by Christof Paar. local page: Introduction to Cryptography by Christof Paar. 

Related Pages

Authored by:Christof Paar