000 | 03255nam a22005655i 4500 | ||
---|---|---|---|
001 | 978-3-319-72536-9 | ||
003 | DE-He213 | ||
005 | 20240423125108.0 | ||
007 | cr nn 008mamaa | ||
008 | 181204s2019 sz | s |||| 0|eng d | ||
020 |
_a9783319725369 _9978-3-319-72536-9 |
||
024 | 7 |
_a10.1007/978-3-319-72536-9 _2doi |
|
050 | 4 | _aQA76.9.D35 | |
050 | 4 | _aQ350-390 | |
072 | 7 |
_aUMB _2bicssc |
|
072 | 7 |
_aGPF _2bicssc |
|
072 | 7 |
_aCOM031000 _2bisacsh |
|
072 | 7 |
_aUMB _2thema |
|
072 | 7 |
_aGPF _2thema |
|
082 | 0 | 4 |
_a005.73 _223 |
082 | 0 | 4 |
_a003.54 _223 |
100 | 1 |
_aYan, Song Y. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aCybercryptography: Applicable Cryptography for Cyberspace Security _h[electronic resource] / _cby Song Y. Yan. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXI, 436 p. 104 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _a1 Cyberspace and Cyberspace Security -- 2 Mathematical Preliminaries -- 3. Computational Preliminaries -- 4 Secret-Key Cryptography -- 5 Factoring-Based Cryptography -- 6 Logarithm-Based Cryptography -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography. | |
520 | _aThis book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference. | ||
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aData protection. | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aData Structures and Information Theory. |
650 | 2 | 4 | _aData and Information Security. |
650 | 2 | 4 | _aComputer Communication Networks. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319725345 |
776 | 0 | 8 |
_iPrinted edition: _z9783319725352 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-72536-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
942 | _cSPRINGER | ||
999 |
_c174180 _d174180 |