Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cybercryptographyapplicable cryptogr...
~
SpringerLink (Online service)
Cybercryptographyapplicable cryptography for cyberspace security /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cybercryptographyby Song Y. Yan.
Reminder of title:
applicable cryptography for cyberspace security /
Author:
Yan, Song Y.
Published:
Cham :Springer International Publishing :2019.
Description:
xi, 436 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Cryptography.
Online resource:
https://doi.org/10.1007/978-3-319-72536-9
ISBN:
9783319725369$q(electronic bk.)
Cybercryptographyapplicable cryptography for cyberspace security /
Yan, Song Y.
Cybercryptography
applicable cryptography for cyberspace security /[electronic resource] :by Song Y. Yan. - Cham :Springer International Publishing :2019. - xi, 436 p. :ill., digital ;24 cm.
1 Cyberspace and Cyberspace Security -- 2 Mathematical Preliminaries -- 3. Computational Preliminaries -- 4 Secret-Key Cryptography -- 5 Factoring-Based Cryptography -- 6 Logarithm-Based Cryptography -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography.
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
ISBN: 9783319725369$q(electronic bk.)
Standard No.: 10.1007/978-3-319-72536-9doiSubjects--Topical Terms:
189522
Cryptography.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.824
Cybercryptographyapplicable cryptography for cyberspace security /
LDR
:02362nmm a2200337 a 4500
001
555213
003
DE-He213
005
20181204165050.0
006
m d
007
cr nn 008maaau
008
191121s2019 gw s 0 eng d
020
$a
9783319725369$q(electronic bk.)
020
$a
9783319725345$q(paper)
024
7
$a
10.1007/978-3-319-72536-9
$2
doi
035
$a
978-3-319-72536-9
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UMB
$2
bicssc
072
7
$a
COM031000
$2
bisacsh
072
7
$a
UMB
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.824
$2
23
090
$a
QA76.9.A25
$b
Y21 2019
100
1
$a
Yan, Song Y.
$3
231645
245
1 0
$a
Cybercryptography
$h
[electronic resource] :
$b
applicable cryptography for cyberspace security /
$c
by Song Y. Yan.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
xi, 436 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1 Cyberspace and Cyberspace Security -- 2 Mathematical Preliminaries -- 3. Computational Preliminaries -- 4 Secret-Key Cryptography -- 5 Factoring-Based Cryptography -- 6 Logarithm-Based Cryptography -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography.
520
$a
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
650
0
$a
Cryptography.
$3
189522
650
0
$a
Data encryption (Computer science)
$3
184520
650
1 4
$a
Data Structures and Information Theory.
$3
825714
650
2 4
$a
Security.
$3
760527
650
2 4
$a
Computer Communication Networks.
$3
218087
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
https://doi.org/10.1007/978-3-319-72536-9
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000168025
電子館藏
1圖書
電子書
EB QA76.9.A25 Y21 2019 2019
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-319-72536-9
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login