Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based – such as the discrete logarithm problem and the difficulty of factoring integers.
The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:
• Explains fundamentals of public key cryptography
• Offers numerous examples and exercises
• Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam
• Provides solutions to the end-of-chapter problems
Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Professor Lynn Batten holds the Deakin Chair in Mathematics and is the Director of the Information Security Research Group at Deakin University. Her research interests include combinatorial geometry, computer network security and computational chemistry. As Associate Dean for Academic and Industrial Research at the University of Manitoba, her former institution, she established a number of agreements between the University and various industry and government sectors.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 17855349
Quantité disponible : Plus de 20 disponibles
Vendeur : Harry Alter, Sylva, NC, Etats-Unis
hardcover, Etat : Good, Wiley, IEEE Press, c.2013, 8vo., glossy boards, 201pp., some glue showing at title-page, ow VG $. N° de réf. du vendeur 102407
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 17855349-n
Quantité disponible : Plus de 20 disponibles
Vendeur : Grand Eagle Retail, Bensenville, IL, Etats-Unis
Hardcover. Etat : new. Hardcover. Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based such as the discrete logarithm problem and the difficulty of factoring integers. The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography: Explains fundamentals of public key cryptography Offers numerous examples and exercises Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam Provides solutions to the end-of-chapter problems Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data. This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9781118317129
Quantité disponible : 1 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 17855349
Quantité disponible : Plus de 20 disponibles
Vendeur : Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlande
Etat : New. This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Series: IEEE Press Series on Information and Communication Networks Security. Num Pages: 224 pages, Illustrations. BIC Classification: URY; UTN. Category: (P) Professional & Vocational. Dimension: 240 x 161 x 19. Weight in Grams: 512. . 2013. 1st Edition. Hardcover. . . . . N° de réf. du vendeur V9781118317129
Quantité disponible : 15 disponible(s)
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 17855349-n
Quantité disponible : Plus de 20 disponibles
Vendeur : moluna, Greven, Allemagne
Gebunden. Etat : New. This is a book of great pedagogical value. . . The book is a bright exposition of the mathematical methods most used in public key cryptography, and it is very motivating due to its numerous computational examples and rigorous treatment. (Zentralblatt MAT. N° de réf. du vendeur 556567097
Quantité disponible : Plus de 20 disponibles
Vendeur : Ubiquity Trade, Miami, FL, Etats-Unis
Etat : New. Brand new! Please provide a physical shipping address. N° de réf. du vendeur 9781118317129
Quantité disponible : Plus de 20 disponibles
Vendeur : Kennys Bookstore, Olney, MD, Etats-Unis
Etat : New. This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Series: IEEE Press Series on Information and Communication Networks Security. Num Pages: 224 pages, Illustrations. BIC Classification: URY; UTN. Category: (P) Professional & Vocational. Dimension: 240 x 161 x 19. Weight in Grams: 512. . 2013. 1st Edition. Hardcover. . . . . Books ship from the US and Ireland. N° de réf. du vendeur V9781118317129
Quantité disponible : 15 disponible(s)