This book covers the various hard mathematical problems used in cryptography and on which cybersecurity is built, as well as recent advances on how to solve these problems from a theoretic and practical applied perspective. Students and security engineers will benefit from these leading experts' overviews of computational cryptography.
This book covers the various hard mathematical problems used in cryptography and on which cybersecurity is built, as well as recent advances on how to solve these problems from a theoretic and practical applied perspective. Students and security engineers will benefit from these leading experts' overviews of computational cryptography.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
1. Introduction Joppe Bos and Martijn Stam Part I. Crytanalysis: 2. Lattice attacks on NTRU and LWE - a history of refinements Martin Albrecht and Léo Ducas 3. History of integer factorization Samuel Wagstaff, Jr. 4. Lattice-based integer factorization - an introduction to Coppersmith's Method Alexander May 5. Computing discrete logarithms Rob Granger and Antoine Joux 6. RSA, DH, and DSA in the wild Nadia Heninger 7. A survey of chosen-prefix collisions attacks Marc Stevens Part II. Implementations: 8. Efficient modular arithmetic Joppe Bos, Thorsten Kleinjung and Daniel Page 9. Arithmetic software libraries Victor Shoup 10. XTR and Tori Martijn Stam 11. History of cryptographic key sizes Nigel Smart and Emmanuel Thomé.
1. Introduction Joppe Bos and Martijn Stam Part I. Crytanalysis: 2. Lattice attacks on NTRU and LWE - a history of refinements Martin Albrecht and Léo Ducas 3. History of integer factorization Samuel Wagstaff, Jr. 4. Lattice-based integer factorization - an introduction to Coppersmith's Method Alexander May 5. Computing discrete logarithms Rob Granger and Antoine Joux 6. RSA, DH, and DSA in the wild Nadia Heninger 7. A survey of chosen-prefix collisions attacks Marc Stevens Part II. Implementations: 8. Efficient modular arithmetic Joppe Bos, Thorsten Kleinjung and Daniel Page 9. Arithmetic software libraries Victor Shoup 10. XTR and Tori Martijn Stam 11. History of cryptographic key sizes Nigel Smart and Emmanuel Thomé.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826