Cybercryptography: Applicable Cryptography for Cyberspace Security
Autor Song Y. Yanen Limba Engleză Hardback – 21 ian 2019
Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
Preț: 747.35 lei
Preț vechi: 934.19 lei
-20%
Puncte Express: 1121
Preț estimativ în valută:
132.05€ • 152.22$ • 115.29£
132.05€ • 152.22$ • 115.29£
Carte tipărită la comandă
Livrare economică 16-30 mai
Specificații
ISBN-13: 9783319725345
ISBN-10: 3319725343
Pagini: 448
Ilustrații: XI, 436 p. 104 illus.
Dimensiuni: 160 x 241 x 29 mm
Greutate: 0.83 kg
Ediția:1st ed. 2019
Editura: Springer
Locul publicării:Cham, Switzerland
ISBN-10: 3319725343
Pagini: 448
Ilustrații: XI, 436 p. 104 illus.
Dimensiuni: 160 x 241 x 29 mm
Greutate: 0.83 kg
Ediția:1st ed. 2019
Editura: Springer
Locul publicării:Cham, Switzerland
Cuprins
1 Cyberspace and Cyberspace Security.- 2 Mathematical Preliminaries.- 3. Computational Preliminaries.- 4 Secret-Key Cryptography.- 5 Factoring-Based Cryptography.- 6 Logarithm-Based Cryptography.- 7 Elliptic Curve Cryptography.- 8 Quantum-Safe Cryptography.- 9 Offensive Cryptography.
Recenzii
“This is a nice textbook for students who want a quick overview of modern cryptosystems. It will also be useful for researchers and professionals working in cybersecurity. The book is easy to read. I strongly recommend it.” (Manish Gupta, Computing Reviews, May 03, 2019)
Caracteristici
Offers Unifying theory and practice Covers combining security-key and public-key techniques Discusses defensive and offensive cryptography Applicable to cyberspace security Accessible to a wide range of audiences