A Classical Introduction to Cryptography Exercise Book

  • Thomas Baigèneres
  • Yi Lu
  • Serge Vaudenay
  • Pascal Junod
  • Jean Monnerat
Book

Table of contents

About this book

Introduction

This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005.

A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises.

The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.

Keywords

Computer DES algorithms calculus communication complexity complexity theory computer science cryptography cryptology number theory

Authors and affiliations

  • Thomas Baigèneres
    • 1
  • Yi Lu
    • 1
  • Serge Vaudenay
    • 2
  • Pascal Junod
    • 2
  • Jean Monnerat
    • 1
  1. 1.EPFL - I&C - LASECLausanneSwitzerland
  2. 2.LausanneSwitzerland

Bibliographic information

  • DOI https://doi.org/10.1007/0-387-28835-X
  • Copyright Information Springer Science+Business Media, Inc. 2006
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-27934-3
  • Online ISBN 978-0-387-28835-2
  • About this book