Introduction to Modern Cryptography: Revised Third Edition
Autor Jonathan Katz, Yehuda Lindellen Limba Engleză Hardback – 17 aug 2025
The book’s focus is on modern cryptography, which is distinguished from classical cryptography by its emphasis on definitions, precise assumptions, and rigorous proofs of security. A unique feature of the text is that it presents theoretical foundations with an eye toward understanding cryptography as used in the real world. This revised edition fixed typos and includes all the updates made to the third edition, including:
- Enhanced treatment of several modern aspects of private-key cryptography, including authenticated encryption and nonce-based encryption.
- Coverage of widely used standards such as GMAC, Poly1305, GCM, CCM, and ChaCha20-Poly1305.
- New sections on the ChaCha20 stream cipher, sponge-based hash functions, and SHA-3.
- Increased coverage of elliptic-curve cryptography, including a discussion of various curves used in practice.
- A new chapter describing the impact of quantum computers on cryptography and providing examples of quantum-secure encryption and signature schemes.
| Toate formatele și edițiile | Preț | Express |
|---|---|---|
| Hardback (1) | 826.08 lei 3-5 săpt. | |
| CRC Press – 21 dec 2020 | 826.08 lei 3-5 săpt. | |
| Hardback (1) | 654.80 lei 3-5 săpt. | +0.00 lei 6-12 zile |
| CRC Press – 17 aug 2025 | 654.80 lei 3-5 săpt. | +0.00 lei 6-12 zile |
Preț: 654.80 lei
Preț vechi: 915.68 lei
-28%
Puncte Express: 982
Preț estimativ în valută:
115.88€ • 135.43$ • 100.61£
115.88€ • 135.43$ • 100.61£
Carte disponibilă
Livrare economică 30 ianuarie-13 februarie
Livrare express 15-21 ianuarie pentru 892.94 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781032496795
ISBN-10: 1032496797
Pagini: 640
Ilustrații: 88
Dimensiuni: 156 x 234 x 39 mm
Greutate: 1.18 kg
Ediția:Nouă
Editura: CRC Press
Colecția Chapman and Hall/CRC
ISBN-10: 1032496797
Pagini: 640
Ilustrații: 88
Dimensiuni: 156 x 234 x 39 mm
Greutate: 1.18 kg
Ediția:Nouă
Editura: CRC Press
Colecția Chapman and Hall/CRC
Public țintă
Undergraduate AdvancedCuprins
1.Introduction
2.Perfectly Secret Encryption
3.Private-Key Encryption
4.Message Authentication Codes
5.CCA-Security and Authenticated Encryption
6.Hash Functions and Applications
7.Practical Constructions of Symmetric-Key Primitives
8.Theoretical Constructions of Symmetric-Key Primitives
9.Number Theory and Cryptographic Hardness Assumptions
10.Algorithms for Factoring and Computing Discrete Logarithms
11.Key Management and the Public-Key Revolution
12.Public-Key Encryption
13.Digital Signature Schemes
14.Quantum-Secure Cryptography
15.Advanced Topics in Public-Key Encryption
2.Perfectly Secret Encryption
3.Private-Key Encryption
4.Message Authentication Codes
5.CCA-Security and Authenticated Encryption
6.Hash Functions and Applications
7.Practical Constructions of Symmetric-Key Primitives
8.Theoretical Constructions of Symmetric-Key Primitives
9.Number Theory and Cryptographic Hardness Assumptions
10.Algorithms for Factoring and Computing Discrete Logarithms
11.Key Management and the Public-Key Revolution
12.Public-Key Encryption
13.Digital Signature Schemes
14.Quantum-Secure Cryptography
15.Advanced Topics in Public-Key Encryption
Notă biografică
Jonathan Katz is a senior staff research scientist at Google. He was formerly a professor in the Department of Computer Science at the University of Maryland, where he also served as director of the Maryland Cybersecurity Cener. He is a fellow of the IACR and the ACM.
Yehuda Lindell is head of cryptogeraphy at Coinbase, and a professor in the Department of Computer Science at Bar-Ilan University. He is a fellow of the IACR.
Yehuda Lindell is head of cryptogeraphy at Coinbase, and a professor in the Department of Computer Science at Bar-Ilan University. He is a fellow of the IACR.
Descriere
Introduction to Modern Cryptography is the most relied-upon source in the field. The book provides a mathematically rigorous yet accessible treatment of this fascinating subject. This is an updated edition of the most widely used introduction to cryptography textbook.
Recenzii
The organization is quite natural, and aligns well with my course. My course covers the topics in exactly the same order as in Katz and Lindell, except that we skip some sections due to time constraints. I actually find Chapter 1 (Introduction) among the strongest aspects of this book. It does an excellent job discussing historical cryptography, explaining the motivation behind "modern cryptography," and introducing the non-expert to some of the basic concepts on which the rest of the contents of the book are built. I think this is an excellent textbook, and I can find very little fault with it. As I mentioned above, a possible suggestion is to add some more modern topics (lattice crypto, code-based crypto, FHE, obfuscation etc.) On the other hand, as an introductory textbook, it is perhaps also fine without those more advanced and more modern topics. - Gorjan Alagic
I find Chapters 2 and 5 to be the best. Both for its clarity. Chapter 2 is clear on certain details that, in my view, make the material much easier to understand than other treatments I have come across. E.g., clearly clarifying that when we consider the notion of "secret," we address the case only that one single message is sent. Not multiple messages. This really helps one quickly understand the technical details and proofs. Similarly, Chapter 5 on hash functions, in my view, is tricky to present. E.g., it must be clear that one is not dealing with a particular instance of a collision, but really finding collisions. This distinction is made very clearly in this book.- Mahesh Tripunitara
I find Chapters 2 and 5 to be the best. Both for its clarity. Chapter 2 is clear on certain details that, in my view, make the material much easier to understand than other treatments I have come across. E.g., clearly clarifying that when we consider the notion of "secret," we address the case only that one single message is sent. Not multiple messages. This really helps one quickly understand the technical details and proofs. Similarly, Chapter 5 on hash functions, in my view, is tricky to present. E.g., it must be clear that one is not dealing with a particular instance of a collision, but really finding collisions. This distinction is made very clearly in this book.- Mahesh Tripunitara