Cybercryptography: Applicable Cryptography for Cyberspace Security

Yan, Song Y.

Cybercryptography: Applicable Cryptography for Cyberspace Security [electronic resource] / by Song Y. Yan. - 1st ed. 2019. - XI, 436 p. 104 illus. online resource.

1 Cyberspace and Cyberspace Security -- 2 Mathematical Preliminaries -- 3. Computational Preliminaries -- 4 Secret-Key Cryptography -- 5 Factoring-Based Cryptography -- 6 Logarithm-Based Cryptography -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography.

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

9783319725369

10.1007/978-3-319-72536-9 doi


Data structures (Computer science).
Information theory.
Data protection.
Computer networks .
Data Structures and Information Theory.
Data and Information Security.
Computer Communication Networks.

QA76.9.D35 Q350-390

005.73 003.54
© 2024 IIIT-Delhi, library@iiitd.ac.in