資料來源: Google Book
Cryptography in the information society[electronic resource]
- 作者: Ryabko, Boris.
- 其他作者: Fionov, Andrey.
- 出版: Singapore : World Scientific c2021.
- 稽核項: 1 online resource (xii, 273 p.).
- 標題: Cryptography , Mathematics. , Data encryption (Computer science) , Data encryption (Computer science) Mathematics. , Cryptography Mathematics. , Cryptography.
- ISBN: 9811226164 , 9789811226168
- ISBN: 9789811226151
- 試查全文@TNUA:
- 附註: Includes bibliographical references and index. Preface -- Acknowledgments -- Introduction -- Public key cryptosystems -- Solving discrete logarithm problem -- Digital signatures -- Cryptographic protocols -- Elliptic curve cryptosystems -- Theoretical security of cryptosystems -- Modern secret key ciphers and hash functions -- Cryptocurrencies and the blockchain -- Random numbers in cryptography -- Steganography -- Answers to problems and exercises -- Bibliography -- Index.
- 摘要: "This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided"--Publisher's website.
- 電子資源: https://dbs.tnua.edu.tw/login?url=https://www.worldscientific.com/worldscibooks/10.1142/11988#t=toc
- 系統號: 005325987
- 資料類型: 電子書
- 讀者標籤: 需登入
- 引用網址: 複製連結
"This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided"--
來源: Google Book
來源: Google Book
評分