Inicio > > Ciencias de la computación > Cryptanalytic Attacks on RSA
Cryptanalytic Attacks on RSA

Cryptanalytic Attacks on RSA

Song Y. Yan

132,63 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2007
Materia
Ciencias de la computación
ISBN:
9780387487410
132,63 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today’s digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first, followed by an account of the RSA cryptographic system and its variants. This book is also suitable as a secondary text for advanced-level students in computer science and mathematics.

Artículos relacionados

  • Skills for Managing Rapidly Changing IT Projects
    Fabrizio Fioravanti
    ...
    Disponible

    118,39 €

  • Design and Usability of Digital Libraries
    Schubert Foo / Yin-Leng Theng
    ...
    Disponible

    112,35 €

  • Intelligent Information Technologies and Applications
    Vijayan Sugumaran
    ...
    Disponible

    131,73 €

  • Mobile Technology Consumption
    Whether used for communication, entertainment, socio-economic growth, crowd-sourcing social and political events, monitoring vital signs in patients, helping to drive vehicles, or delivering education, mobile technology has been transformed from a mode to a medium. Mobile Technology Consumption: Opportunities and Challenges explores essential questions related to the cost, bene...
    Disponible

    249,07 €

  • Creating Personal, Social, and Urban Awareness through Pervasive Computing
    Guo
    The recent emergence and prevalence of social network applications, sensor equipped mobile devices, and the availability of large amounts of geo-referenced data have enabled the analysis of new context dimensions that involve individual, social, and urban context. Creating Personal, Social, and Urban Awareness through Pervasive Computing provides an overview of the theories, te...
    Disponible

    230,09 €

  • Fostering 21st Century Digital Literacy and Technical Competency
    Antonio Cartelli
    The 21st century has seen an expansion in digital technology and the ways in which it affects everyday life. These technologies have become essential in the growth of social communication and mass media. Fostering 21st Century Digital Literacy and Technical Competency offers the latest in research on the technological advances on computer proficiency in the educational system a...
    Disponible

    229,67 €

Otros libros del autor

  • Quantum Computational Number Theory
    Song Y. Yan
    This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, int...
    Disponible

    134,05 €

  • Quantum Attacks on Public-Key Cryptosystems
    Song Y. Yan
    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them...
    Disponible

    134,26 €

  • Quantum Attacks on Public-Key Cryptosystems
    Song Y. Yan
    The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them...
    Disponible

    132,91 €

  • Number Theory for Computing
    Song Y. Yan
    This book provides a good introduction to the classical elementary number theory and the modern algorithmic number theory, and their applications in computing and information technology, including computer systems design, cryptography and network security. In this second edition proofs of many theorems have been provided, further additions and correct...
    Disponible

    77,78 €

  • Primality Testing and Integer Factorization in Public-Key Cryptography
    Song Y. Yan
    Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography. For this updated and revised edition, notable new features include a comparison of the R...
    Disponible

    242,88 €

  • Cryptanalytic Attacks on RSA
    Song Y. Yan
    Computational/Mathematical Preliminaries.- RSA Public-Key Cryptography.- Integer Factorization Attacks.- Discrete Logarithm Attacks.- Quantum Computing Attacks.- Simple Elementary Attacks.- Public Exponent Attacks.- Private Exponent Attacks.- Side-Channel Attacks.- The Road Ahead. ...
    Disponible

    157,36 €