Listing 1 - 5 of 5 |
Sort by
|
Choose an application
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur
Public key cryptography. --- Cryptography --- Mathematics. --- Public key cryptography --- Cryptography -- Mathematics
Choose an application
Generic group algorithms solve computational problems defined over algebraic groups without exploiting properties of a particular representation of group elements. This is modeled by treating the group as a black-box. The fact that a computational problem cannot be solved by a reasonably restricted class of algorithms may be seen as support towards the conjecture that the problem is also hard in the classical Turing machine model. Moreover, a lower complexity bound for certain algorithms is a helpful insight for the search for cryptanalytic algorithms. Tibor Jager addresses several fundamental questions concerning algebraic black-box models of computation: Are the generic group model and its variants a reasonable abstraction? What are the limitations of these models? Can we relax these models to bring them closer to the reality?
Cryptography -- Mathematics. --- Data encryption (Computer science) -- Mathematics. --- Data mining -- Mathematics. --- Mathematics. --- Mathematics --- Physical Sciences & Mathematics --- Mathematics - General --- Cryptography --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer mathematics. --- Computational Mathematics and Numerical Analysis. --- Computer security --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Computer science --- Computer mathematics --- Discrete mathematics --- Electronic data processing
Choose an application
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: * classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; * fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; * an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.
Computer science --- Cryptography --- Cryptographie --- Mathematics. --- Mathématiques --- Mathematics --- Coding theory. --- Cryptography --Mathematics. --- Coding theory --- Education --- Social Sciences --- Physical Sciences & Mathematics --- Algebra --- Book Studies & Arts --- Signs and symbols. --- Mathématiques --- EPUB-LIV-FT LIVMATHE LIVSTATI SPRINGER-B --- Representation, Symbolic --- Semeiotics --- Signs --- Symbolic representation --- Symbols --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Data structures (Computer science). --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Information theory. --- Number theory. --- Number Theory. --- Coding and Information Theory. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Information and Communication, Circuits. --- Order, Lattices, Ordered Algebraic Structures. --- Abbreviations --- Omens --- Semiotics --- Sign language --- Symbolism --- Visual communication --- Signs and symbols --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Mathematical analysis --- Math --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Number study --- Numbers, Theory of --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Communication theory --- Communication --- Cybernetics --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Cryptography - Mathematics
Choose an application
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
Computer Science. --- Data Structures, Cryptology and Information Theory. --- Circuits and Systems. --- Systems and Data Security. --- Computer science. --- Data protection. --- Data structures (Computer science). --- Systems engineering. --- Informatique --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Ingénierie des systèmes --- Cryptography. --- Cryptography --- Data encryption (Computer science) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematics. --- Cryptography -- Mathematics. --- Data encryption (Computer science). --- Electronic books. -- local. --- Book Studies & Arts --- Computer Science --- Engineering & Applied Sciences --- Education --- Social Sciences --- Mathematics --- Computer programming. --- Computer security. --- Electrical engineering. --- Electronic circuits. --- Programming Techniques. --- Communications Engineering, Networks. --- Data structures (Computer scienc. --- Telecommunication. --- Data Structures and Information Theory. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Electric engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Programming --- Data structures (Computer science)
Choose an application
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.
Cryptography -- Mathematics. --- Euclidean algorithm. --- Integer programming. --- Lattice theory. --- Cryptography --- Lattice theory --- Integer programming --- Euclidean algorithm --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Computer Science --- Mathematical Theory --- Algorithms. --- Mathematics. --- Algorithm of Euclid --- Continued division --- Division, Continued --- Euclid algorithm --- Euclidian algorithm --- Euclid's algorithm --- Lattices (Mathematics) --- Space lattice (Mathematics) --- Structural analysis (Mathematics) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Data Structures. --- Data Encryption. --- Mathematics of Computing. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algebra --- Arithmetic --- Foundations --- Algorithms --- Number theory --- Programming (Mathematics) --- Algebra, Abstract --- Algebra, Boolean --- Group theory --- Set theory --- Topology --- Transformations (Mathematics) --- Crystallography, Mathematical --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Computer software. --- Cryptology. --- Data Structures and Information Theory. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Software, Computer --- Computer systems --- Computer science—Mathematics. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Artificial intelligence --- Cryptography. --- Information theory. --- Data Science. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer mathematics
Listing 1 - 5 of 5 |
Sort by
|