
×
„This is a book of great pedagogical value. . . The bookis a bright exposition of the mathematical methods most used inpublic key cryptography, and it is very motivating due to itsnumerous computational examples and rigoroustreatment.“ (Zentralblatt MATH, 1 August2013)
„The book is suitable as a university text for years threeand above, and I recommend that every computer scientist read it. Iwould be inclined to describe this book as offering “whatevery computer scientist should know about public keycryptography." (Computing Reviews, 9 September2013)
Complete coverage of the current major public key cryptosystemstheir underlying mathematics and the most common techniques used inattacking them Public Key Cryptography: Applications andAttacks introduces and explains the fundamentals of public keycryptography and explores its application in all major public keycryptosystems in current use, including ElGamal, RSA, EllipticCurve, and digital signature schemes. It provides the underlyingmathematics needed to build and study these schemes as needed, andexamines attacks on said schemes via the mathematical problems onwhich they are based - such as the discrete logarithm problemand the difficulty of factoring integers.
The book contains approximately ten examples with detailedsolutions, while each chapter includes forty to fifty problems withfull solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:
* Explains fundamentals of public key cryptography
* Offers numerous examples and exercises
* Provides excellent study tools for those preparing totake the Certified Information Systems Security Professional(CISSP) exam
* Provides solutions to the end-of-chapter problems
Public Key Cryptography provides a solid background foranyone who is employed by or seeking employment with a governmentorganization, cloud service provider, or any large enterprise thatuses public key systems to secure data.
The book contains approximately ten examples with detailedsolutions, while each chapter includes forty to fifty problems withfull solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:
* Explains fundamentals of public key cryptography
* Offers numerous examples and exercises
* Provides excellent study tools for those preparing totake the Certified Information Systems Security Professional(CISSP) exam
* Provides solutions to the end-of-chapter problems
Public Key Cryptography provides a solid background foranyone who is employed by or seeking employment with a governmentorganization, cloud service provider, or any large enterprise thatuses public key systems to secure data.