000 03255nam a22005655i 4500
001 978-3-319-72536-9
003 DE-He213
005 20240423125108.0
007 cr nn 008mamaa
008 181204s2019 sz | s |||| 0|eng d
020 _a9783319725369
_9978-3-319-72536-9
024 7 _a10.1007/978-3-319-72536-9
_2doi
050 4 _aQA76.9.D35
050 4 _aQ350-390
072 7 _aUMB
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM031000
_2bisacsh
072 7 _aUMB
_2thema
072 7 _aGPF
_2thema
082 0 4 _a005.73
_223
082 0 4 _a003.54
_223
100 1 _aYan, Song Y.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aCybercryptography: Applicable Cryptography for Cyberspace Security
_h[electronic resource] /
_cby Song Y. Yan.
250 _a1st ed. 2019.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2019.
300 _aXI, 436 p. 104 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _a1 Cyberspace and Cyberspace Security -- 2 Mathematical Preliminaries -- 3. Computational Preliminaries -- 4 Secret-Key Cryptography -- 5 Factoring-Based Cryptography -- 6 Logarithm-Based Cryptography -- 7 Elliptic Curve Cryptography -- 8 Quantum-Safe Cryptography -- 9 Offensive Cryptography.
520 _aThis book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.
650 0 _aData structures (Computer science).
650 0 _aInformation theory.
650 0 _aData protection.
650 0 _aComputer networks .
650 1 4 _aData Structures and Information Theory.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319725345
776 0 8 _iPrinted edition:
_z9783319725352
856 4 0 _uhttps://doi.org/10.1007/978-3-319-72536-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c174180
_d174180