๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Public key cryptography: applications and attacks

โœ Scribed by Lynn Margaret Batten


Publisher
Wiley-IEEE Press
Year
2013
Tongue
English
Leaves
224
Series
IEEE Press series on information and communication networks security
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Security Professional).


๐Ÿ“œ SIMILAR VOLUMES


Public Key Cryptography: Applications an
โœ Lynn Margaret Batten(auth.), Stamatios Kartalopoulos(eds.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used i

Public Key Cryptography: Applications an
โœ Lynn Margaret Batten ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used i

Public Key Cryptography: Applications an
โœ Lynn Margaret Batten ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used i

Public key cryptography: applications an
โœ Batten, Lynn Margaret ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› John Wiley & Sons, John Wiley distributor ๐ŸŒ English

This text covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used i

RSA and Public-Key Cryptography
โœ Richard A. Mollin ๐Ÿ“‚ Library ๐Ÿ“… 2002 ๐Ÿ› Chapman and Hall/CRC ๐ŸŒ English

Although a vast literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richard A. Mollin brings together all of the relevant information available on public-k

RSA and public-key cryptography
โœ Richard A. Mollin ๐Ÿ“‚ Library ๐Ÿ“… 2003 ๐Ÿ› Chapman & Hall/CRC ๐ŸŒ English

Although a vast literature exists on the subject of RSA and public-key cryptography, until now there has been no single source that reveals recent developments in the area at an accessible level. Acclaimed author Richard A. Mollin brings together all of the relevant information available on public-k