Recent Advances in RSA Cryptography: Advances in Information Security, cartea 3
Autor Stefan Katzenbeisseren Limba Engleză Paperback – 24 oct 2012
Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way.
Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 633.53 lei 43-57 zile | |
Springer Us – 24 oct 2012 | 633.53 lei 43-57 zile | |
Hardback (1) | 640.06 lei 43-57 zile | |
Springer Us – 30 sep 2001 | 640.06 lei 43-57 zile |
Din seria Advances in Information Security
- 20% Preț: 997.96 lei
- 20% Preț: 647.28 lei
- 20% Preț: 901.82 lei
- 20% Preț: 1165.69 lei
- 20% Preț: 866.27 lei
- 20% Preț: 935.19 lei
- 20% Preț: 638.69 lei
- 15% Preț: 637.28 lei
- 20% Preț: 647.79 lei
- 20% Preț: 1152.15 lei
- 24% Preț: 833.48 lei
- 20% Preț: 545.13 lei
- 20% Preț: 1050.67 lei
- 18% Preț: 1674.82 lei
- 20% Preț: 933.57 lei
- 20% Preț: 1171.94 lei
- 20% Preț: 931.51 lei
- 18% Preț: 949.10 lei
- 20% Preț: 995.75 lei
- 20% Preț: 644.66 lei
- 20% Preț: 643.30 lei
- 15% Preț: 641.20 lei
- 20% Preț: 647.61 lei
- 20% Preț: 648.11 lei
- 20% Preț: 652.54 lei
- 20% Preț: 642.98 lei
- 20% Preț: 640.35 lei
- 15% Preț: 639.59 lei
- 15% Preț: 637.46 lei
- 20% Preț: 820.50 lei
- 18% Preț: 1219.01 lei
Preț: 633.53 lei
Preț vechi: 745.32 lei
-15% Nou
Puncte Express: 950
Preț estimativ în valută:
121.26€ • 131.76$ • 101.93£
121.26€ • 131.76$ • 101.93£
Carte tipărită la comandă
Livrare economică 21 aprilie-05 mai
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781461355502
ISBN-10: 1461355508
Pagini: 156
Ilustrații: XIII, 140 p.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.23 kg
Ediția:Softcover reprint of the original 1st ed. 2001
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
ISBN-10: 1461355508
Pagini: 156
Ilustrații: XIII, 140 p.
Dimensiuni: 155 x 235 x 8 mm
Greutate: 0.23 kg
Ediția:Softcover reprint of the original 1st ed. 2001
Editura: Springer Us
Colecția Springer
Seria Advances in Information Security
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
1. Mathematical Background.- 1 1 Divisibility and the residue class ring ?n.- 1.2 Polynomials.- 1.3 Euler’s totient function and ?n*.- 1.4 Polynomial congruences and systems of linear congruences.- 1.5 Quadratic residues.- 2. Computational Complexity.- 2.1 Turing machines.- 2.2 Deterministic and nondeterministic machines.- 2.3 Decision problems and complexity classes.- 2.4 Reductions, completeness and oracle computations.- 2.5 co—NP.- 2.6 Efficient computation and randomized complexity classes.- 3. Public Key Cryptography.- 3.1 Public key cryptography.- 3.2 Permutation polynomials and RSA-type cryptosystems.- 3.3 Efficient implementation of RSA.- 3.4 One-way functions.- 3.5 On the complexity of an attack against RSA.- 4. Factorization Methods.- 4.1 Trial division and Fermat factorization.- 4.2 Monte-carlo factorization.- 4.3 Factor base methods.- 4.4 The continued fraction method.- 4.5 Quadratic sieve.- 4.6 Other Factorization Methods.- 5. Properties of the RSA Cryptosystem.- 5.1 Computing the decryption exponent.- 5.2 Partial decryption.- 5.3 Cycling attacks and superencryption.- 5.4 Incorrect keys.- 5.5 Partial information on RSA and hard-core predicates.- 6. Low-Exponent RSA.- 6.1 Wiener’s attack.- 6.2 Lattice basis reduction.- 6.3 The attack of Boneh and Durfee.- 6.4 Low public exponents.- 6.5 Polynomially related messages.- 6.6 Partial key exposure.- 7. Protocol and Implementation Attacks.- 7.1 Simple protocol attacks against RSA.- 7.2 Håstad’s broadcast attack.- 7.3 Effective security of small RSA messages.- 7.4 Optimal Asymmetric Encryption.- 7.5 Faulty encryption.- 7.6 Timing attacks.- 8. RSA Signatures.- 8.1 Attacks on RSA signatures with redundancy.- 8.2 Security of hash-and-sign signatures.- 8.3 Provably secure RSA signatures.- 8.4 Undeniablesignatures.- 8.5 Threshold signatures.- References.