|
![]() |
|||
|
||||
OverviewThis book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference. Full Product DetailsAuthor: Song Y. YanPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2019 Weight: 0.834kg ISBN: 9783319725345ISBN 10: 3319725343 Pages: 436 Publication Date: 21 January 2019 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1 Cyberspace and Cyberspace Security.- 2 Mathematical Preliminaries.- 3. Computational Preliminaries.- 4 Secret-Key Cryptography.- 5 Factoring-Based Cryptography.- 6 Logarithm-Based Cryptography.- 7 Elliptic Curve Cryptography.- 8 Quantum-Safe Cryptography.- 9 Offensive Cryptography.ReviewsThis is a nice textbook for students who want a quick overview of modern cryptosystems. It will also be useful for researchers and professionals working in cybersecurity. The book is easy to read. I strongly recommend it. (Manish Gupta, Computing Reviews, May 03, 2019) Author InformationTab Content 6Author Website:Countries AvailableAll regions |