A smart choice for both novice and experienced professionals looking to broaden their knowledge of contemporary cryptography, this comprehensive resource puts all aspects of this important topic into perspective. Unlike other books on the market that are either limited in scope or very theoretical, This unique resource delivers a thorough introduction to the current state-of-the-art in modern cryptography, offering a practical understanding of essential tools and applications to help professionals with their daily work. The book also includes complete coverage of the underpinnings and basic principles of cryptography to help practitioners and students fully master the material.
The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: Efficient distributed computation modulo a shared secret, multiparty computation, modern cryptography, provable security for public key schemes, and efficient and secure public-key cryptosystems....
This text covers the parts of contemporary set theory relevant to other areas of pure mathematics. After a review of "nave" set theory, it develops the Zermelo-Fraenkel axioms of the theory before discussing the ordinal and cardinal numbers. It then delves into contemporary set theory, covering such topics as the Borel hierarchy and Lebesgue measure. A final chapter presents an alternative conception of set theory useful in computer science....
The third is a series of appendices that summarize for the reader information about the content of certain theoretical models of criticism. Finally, a bibliography listing a wide variety of rhetorical critical studies and reference works is included. (An index could be added once final pagination is settled)...