Home :: Books :: Professional & Technical  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet
Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical

Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

List Price: $83.95
Your Price:
Product Info Reviews

<< 1 2 >>

Rating: 2 stars
Summary: some really good sections but...
Review: ** Covers all the essential areas (except random numbers).

** This edition has alot of errors (typos mostly).

** For a compsci guys the math is probably very detailed but for me (as a mathematician) I think he takes too much for granted.

** Better than Schnier on cryptanalysis and attack mentality.

** The section on linear cryptanalysis took along time to understand though, and the break came when I downloaded additional tutorials from the internet.

** Very good section on AES.

** The algorithm descriptions (in pseudocode) are terrible to read, they are next to unreadable actually. He uses unnecessary indices, and the code is often thrown right in your face without explaination.

** The book is way too expensive, so at the end of the day I suggest students should be downloading the free e-book "Handbook of Applied Cryptography" instead... but if you work for a company with alot of money... this book is still pretty good.

Rating: 5 stars
Summary: It packs a lot in a small space
Review: A book that tries to cover the theory and practice of cryptography in only four hundred pages has to make a lot of ruthless choices.

Professor Stinson wisely concentrates on theory, with a few nods to practice like explaining efficient modular exponentiation.

The theoretical material starts with the indispensable foundation of information theory and jumps straight into the operation of commercially important algorithms and their weaknesses. These are short but well done. For example Stinson has the best presentation of differential cryptanalysis that I've seen.

The breadth is good, covering most of the important magic that you can work with crypto: secret sharing, key exchange, zero knowledge proofs, etc.

Oddly, there doesn't seem to be a discussion of the blinding techniques used in Chaum's digital cash. Maybe that's because they're not yet a major part of the landscape, but then why spend space on the McEliece system?

A useful fraction of the book is accessible if you just have high school math, all of it with college math.

This would be a fine introduction to crypto.

Rating: 3 stars
Summary: Could be a great book .... but it falls short
Review: As other people have pointed out, this is not a mathematics book, and it is not an algorithm (recipies) book. It could be a great book for people that are interested in learning these tools to actually use them, either in a research or product development context (something besides homework). Unfortunately, the number of typos, in key mathematical expressions AND PORTIONS OF THE EXPLANATIONS is staggering. Go to the author's web page and you will find that some chapters, like 4 for example, average more than one typo per page (and some of these 'typos' are full sentences, or math expressions that do not look like anything that is actually printed on the page). If you do not have that errata sheet handy, you will waste a lot of time trying to understand the text, or trying to solve the exercises. If you are trying to learn from this book, without attending a class and without the errata, you will simply give up. It is a real shame because it has all the makings of a great book.

Rating: 5 stars
Summary: Brilliant!
Review: If you could have only one book on cryptography, it should be Schneier's "Applied Cryptography". If you want two, make this your second! While it far outscores the former in terms of depth, it's weaker in breadth, but that's not a problem for any budding cryptologist.

It's a perfect blend of algorithms and mathematics, some of which take a little while to comprehend (if like me, you're not a mathematics graduate), but it's more than worth the effort.

Of all the books in my bookshelves, this would be the one I'd save in a fire. Sorry Knuth. :)

Rating: 5 stars
Summary: the math behind crypto
Review: If you liked Schneier's book but disliked the way he covers the mathematical background with a lot of hand-waving, then I highly recommend this book. This is where you can learn how it all really works.

Rating: 5 stars
Summary: the math behind crypto
Review: If you liked Schneier's book but disliked the way he covers the mathematical background with a lot of hand-waving, then I highly recommend this book. This is where you can learn how it all really works.

Rating: 3 stars
Summary: second edition is the first volume of a two-part book
Review: The first edition of this book was one of the few excellent text books on cryptography. It is now somewhat outdated, so a second updated edition was much anticipated. Indeed, the second edition does improve upon the first edition in many ways. There are lots of updates and new exercises. Its major shortcoming, however, is that important chapters such as random number bit generation and key agreement have been deleted and deferred to the second volume of the second edition (which, according to the preface, is a works in progress). I have used the first edition in a crypto course I teach, but will not use the second edition in future course offerings because of the missing coverage of important topics. Also, even when the second volume is published, it would be too expensive for students to purchase both volumes ...

Rating: 1 stars
Summary: Too many errors
Review: The large number of errors and typographical mistakes in this book severly reduce its value as a reference or a textbook. A current errata list is available on the author's web site. In a book as math-centric as this one, typographical mistakes in key formulas and examples is inexcusable.

For what this book sells for, especially considering how short it is at less than 400 pages, they should have done a much better job proofreading and checking the excercises than they did before it hit the presses. Unless you need this as a text book, wait for the third edition or find another reference. This one isn't worth the money.

Rating: 5 stars
Summary: Very good book! I have really enjoyed it!
Review: The philosophy underlying the previous edition stays the same. The presentation of concepts is rigorous but neither difficult nor trivial, suitable for readers with basic notions of linear algebra. Moreover, new material has been added.

Chapter 3, which deals with block ciphers and linear and differential cryptoanalysis, is very well-written. This is the best presentation of such a subject in few pages I have seen until now.

Chapters 4, 5, 6 and 7 have been significantly updated and expanded with concepts and techniques that are fundamental in order to understand current researches and state of knowledge in Cryptography (e.g., random oracle model, semantic security, new attacks against public key cryptosystems, an in-depth introduction to elliptic curve ...).

Compared to the previous edition, more emphasys has been given in some parts to security proofs (e.g, chapter 4), and several new exercises have been proposed at the end of each chapter.

Other readers have pointed out that there are some typos (the author has made available an errata list on his home page) but I think that the value of the book is not reduced in any way.

In my opinion it is a great book for people who want to be introduced to problems, ideas, and techniques used in Cryptography.

Rating: 1 stars
Summary: Second edition is disappointing.
Review: There is almost no difference between the first and second
edition, regarding important security protocols. Mostly, key
agreement protocol chapter is deleted (We have to wait
for a second volume for this. But we don't know when the
second volume will come out to the market-maybe 10 years from
now...). Too many errors in the book. Too disappointed...


<< 1 2 >>

© 2004, ReviewFocus or its affiliates