Cybercryptography: Applicable Cryptography for Cyberspace Security Cybercryptography: Applicable Cryptography for Cyberspace Security

Cybercryptography: Applicable Cryptography for Cyberspace Security

    • $99.99
    • $99.99

Publisher Description

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively.
 Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented  in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

GENRE
Computers & Internet
RELEASED
2018
December 4
LANGUAGE
EN
English
LENGTH
447
Pages
PUBLISHER
Springer International Publishing
SELLER
Springer Nature B.V.
SIZE
37.3
MB
Cryptanalytic Attacks on RSA Cryptanalytic Attacks on RSA
2007
Quantum Attacks on Public-Key Cryptosystems Quantum Attacks on Public-Key Cryptosystems
2014
Quantum Computational Number Theory Quantum Computational Number Theory
2015
Integer Algorithms In Cryptology And Information Assurance Integer Algorithms In Cryptology And Information Assurance
2014
Open Problems in Mathematics and Computational Science Open Problems in Mathematics and Computational Science
2015
Locally Decodable Codes and Private Information Retrieval Schemes Locally Decodable Codes and Private Information Retrieval Schemes
2010
Computational Number Theory and Modern Cryptography Computational Number Theory and Modern Cryptography
2012
Quantum Computational Number Theory Quantum Computational Number Theory
2015
Quantum Attacks on Public-Key Cryptosystems Quantum Attacks on Public-Key Cryptosystems
2014
Primality Testing and Integer Factorization in Public-Key Cryptography Primality Testing and Integer Factorization in Public-Key Cryptography
2009
Cryptanalytic Attacks on RSA Cryptanalytic Attacks on RSA
2007