Public Key Cryptography: Applications and Attacks

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security Book 16)
By 作者:Lynn Margaret Batten
Pages 页数: 224 pages
Publisher Finelybook 出版社: Wiley-Blackwell (12 Mar. 2013)
Language 语言: English
ISBN-10 书号:9781118317129
ISBN-13 书号:9781118317129
ASIN: 1118317122
The Book Description robot was collected from Amazon and arranged by Finelybook
Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers.
The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:

Explains fundamentals of public key cryptography
Offers numerous examples and exercises
Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam
Provides solutions to the end-of-chapter problems
Public Key Cryptography provides a solid background for anyone who is employed By 作者::or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.
List of Figures
Chapter 1:Introduction
Chapter 2:Congruence Equations
Chapter 3:The ElGamal Scheme
Chapter 4:The RSA Scheme
Chapter 5:Elliptic Curve Cryptography
Chapter 6:Digital Signatures
Chapter 7:Primality Testing
Chapter 8:Factoring Methods
Appendix Solutions to Problems


Public Key Cryptography Applications and Attacks

未经允许不得转载:finelybook » Public Key Cryptography: Applications and Attacks
分享到: 更多 (0)

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址