This book covers the various hard mathematical problems used in cryptography and on which cybersecurity is built, as well as recent advances on how to solve these problems from a theoretic and practical applied perspective. Students and security engineers will benefit from these leading experts' overviews of computational cryptography.
This book covers the various hard mathematical problems used in cryptography and on which cybersecurity is built, as well as recent advances on how to solve these problems from a theoretic and practical applied perspective. Students and security engineers will benefit from these leading experts' overviews of computational cryptography.
1. Introduction Joppe Bos and Martijn Stam Part I. Crytanalysis: 2. Lattice attacks on NTRU and LWE - a history of refinements Martin Albrecht and Léo Ducas 3. History of integer factorization Samuel Wagstaff, Jr. 4. Lattice-based integer factorization - an introduction to Coppersmith's Method Alexander May 5. Computing discrete logarithms Rob Granger and Antoine Joux 6. RSA, DH, and DSA in the wild Nadia Heninger 7. A survey of chosen-prefix collisions attacks Marc Stevens Part II. Implementations: 8. Efficient modular arithmetic Joppe Bos, Thorsten Kleinjung and Daniel Page 9. Arithmetic software libraries Victor Shoup 10. XTR and Tori Martijn Stam 11. History of cryptographic key sizes Nigel Smart and Emmanuel Thomé.
1. Introduction Joppe Bos and Martijn Stam Part I. Crytanalysis: 2. Lattice attacks on NTRU and LWE - a history of refinements Martin Albrecht and Léo Ducas 3. History of integer factorization Samuel Wagstaff, Jr. 4. Lattice-based integer factorization - an introduction to Coppersmith's Method Alexander May 5. Computing discrete logarithms Rob Granger and Antoine Joux 6. RSA, DH, and DSA in the wild Nadia Heninger 7. A survey of chosen-prefix collisions attacks Marc Stevens Part II. Implementations: 8. Efficient modular arithmetic Joppe Bos, Thorsten Kleinjung and Daniel Page 9. Arithmetic software libraries Victor Shoup 10. XTR and Tori Martijn Stam 11. History of cryptographic key sizes Nigel Smart and Emmanuel Thomé.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309