[12688] in cryptography@c2.net mail archive
REQ: Review of Nigel Smart's "Introduction to Cryptography"
daemon@ATHENA.MIT.EDU (Mads Rasmussen)
Fri Mar 7 13:26:19 2003
X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Fri, 7 Mar 2003 15:14:04 -0300
From: "Mads Rasmussen" <mads@opencs.com.br>
To: <cryptography@wasabisystems.com>
Has anyone read Nigel Smart's book from late 2002, "introduction to
Cryptography"=20
=20
The latest IACR newsletter brought an overview and TOC of the book,
which I found interesting. It seems to me the first time provable
security is mentioned in a textbook (see part IV, 17 and 18)
=20
As the newsletter said, more info is available at
=20
http://www.mcgraw-hill.co.uk/html/0077099877.html
<http://www.mcgraw-hill.co.uk/html/0077099877.html>=20
=20
I would be very interested in hearing from someone that read the book on
how this material is presented. I find Bellare and Rogaway's lecture
notes magnificent but it isn't a textbook.
=20
I quoted the excerpt from the IACR newsletter below for those who might
be interested
=20
Regards,
=20
Mads Rasmussen
=20
--
=20
Cryptography, An Introduction
=20
by Nigel Smart,
McGraw-Hill, 2002.
ISBN 0 077 09987 7 (PB).
=20
Nigel Smart's Cryptography provides the rigorous detail required for
advanced cryptographic studies, yet approaches the subject matter in
an accessible style in order to gently guide new students through
difficult mathematical topics. Covering the latest developments in
cryptography, including the Rijndael algorithm chosen for the new
Advanced Encryption Standard, the OAEP padding system for RSA,
elliptic curve based systems and provable security this book is a
complete introduction to cryptography.
=20
Part I Mathematical Background=20
1 Modular Arithmetic, Groups, Finite Fields and Probability=20
2 Elliptic Curves=20
=20
Part II Symmetric Encryption=20
3 Historical Ciphers=20
4 Information Theoretic Security=20
5 Symmetric Ciphers=20
6 Symmetric Key Distribution=20
=20
Part III Public Key Encryption and Signatures=20
7 Basic Public Key Encryption Algorithms=20
8 Primality Testing and Factoring=20
9 Discrete Logarithms=20
10 Key Exchange, Signature Schemes and Hash Functions=20
11 Implementation Issues=20
12 Obtaining Authentic Public Keys=20
13 Protocols=20
=20
Part IV Security Issues=20
14 Attacks on Public Key Schemes=20
15 Definitions of Security=20
16 Complexity Theoretic Approaches=20
17 Provable Security: With Random Oracles=20
18 Provable Security: Without Random Oracles=20
Appendices=20
Appendix A Basic Mathematical Terminology=20
Appendix B Java Examples=20
Index=20
=20
=20
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com