Cybercryptography: Applicable Cryptography for Cyberspace Security

Author:   Song Y. Yan
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2019
ISBN:  

9783319725345


Pages:   436
Publication Date:   21 January 2019
Format:   Hardback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $284.60 Quantity:  
Add to Cart

Share |

Cybercryptography: Applicable Cryptography for Cyberspace Security


Add your own review!

Overview

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Full Product Details

Author:   Song Y. Yan
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2019
Weight:   0.834kg
ISBN:  

9783319725345


ISBN 10:   3319725343
Pages:   436
Publication Date:   21 January 2019
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Hardback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1 Cyberspace and Cyberspace Security.- 2 Mathematical Preliminaries.- 3. Computational Preliminaries.- 4 Secret-Key Cryptography.- 5 Factoring-Based Cryptography.- 6 Logarithm-Based Cryptography.- 7 Elliptic Curve Cryptography.- 8 Quantum-Safe Cryptography.- 9 Offensive Cryptography.

Reviews

This is a nice textbook for students who want a quick overview of modern cryptosystems. It will also be useful for researchers and professionals working in cybersecurity. The book is easy to read. I strongly recommend it. (Manish Gupta, Computing Reviews, May 03, 2019)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List