**Seasonal Sitewide Sale**

20% Off - Limited time only. Exclusive web offer for individuals on print titles only. Terms & Conditions may apply.

20% Off - Limited time only. Exclusive web offer for individuals on print titles only. Terms & Conditions may apply.

Alexander Stanoyevitch

August 9, 2010
by Chapman and Hall/CRC

Textbook
- 672 Pages
- 75 B/W Illustrations

ISBN 9781439817636 - CAT# K10916

Series: Discrete Mathematics and Its Applications

**For Instructors** Request an e-inspection copy

was $97.95

USD^{$}78^{.36}

SAVE *~*$19.59

Add to Wish List

FREE Standard Shipping!

- Provides a focused, self-contained treatment of cryptography
- Covers elliptic curve cryptography
- Offers complete coverage of all the needed material on number theory and abstract algebra
- Presents algorithms in pseudo-code
- Contains background material and extensive exercise solutions in the appendices
- Includes both standard and computer exercises as well as numerous worked examples
- Incorporates sample programs and platform-independent applets on www.csudh.edu/math/astanoyevitch/cryptography.html

*Solutions manual available for qualifying instructors*

From the exciting history of its development in ancient times to the present day, **Introduction to Cryptography with Mathematical Foundations and Computer Implementations** provides a focused tour of the central concepts of cryptography. Rather than present an encyclopedic treatment of topics in cryptography, it delineates cryptographic concepts in chronological order, developing the mathematics as needed.

Written in an engaging yet rigorous style, each chapter introduces important concepts with clear definitions and theorems. Numerous examples explain key points while figures and tables help illustrate more difficult or subtle concepts. Each chapter is punctuated with "Exercises for the Reader;" complete solutions for these are included in an appendix. Carefully crafted exercise sets are also provided at the end of each chapter, and detailed solutions to most odd-numbered exercises can be found in a designated appendix. The computer implementation section at the end of every chapter guides students through the process of writing their own programs. A supporting website provides an extensive set of sample programs as well as downloadable platform-independent applet pages for some core programs and algorithms.

As the reliance on cryptography by business, government, and industry continues and new technologies for transferring data become available, cryptography plays a permanent, important role in day-to-day operations. This self-contained sophomore-level text traces the evolution of the field, from its origins through present-day cryptosystems, including public key cryptography and elliptic curve cryptography.

We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption.

Request an

e-inspection copy

e-inspection copy