Get Free Shipping on orders over $79
Public Key Cryptography : Applications and Attacks - Lynn Margaret Batten

Public Key Cryptography

Applications and Attacks

By: Lynn Margaret Batten

Hardcover | 15 January 2013 | Edition Number 1

At a Glance

Hardcover


$280.75

or 4 interest-free payments of $70.19 with

 or 

Ships in 5 to 10 business days

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based ? such as the discrete logarithm problem and the difficulty of factoring integers.

The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:

? Explains fundamentals of public key cryptography

? Offers numerous examples and exercises

? Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam

? Provides solutions to the end-of-chapter problems

Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.

Industry Reviews

?This is a book of great pedagogical value. . . The book is a bright exposition of the mathematical methods most used in public key cryptography, and it is very motivating due to its numerous computational examples and rigorous treatment.?  (Zentralblatt  MATH, 1 August 2013)

?The book is suitable as a university text for years three and above, and I recommend that every computer scientist read it. I would be inclined to describe this book as offering ?what every computer scientist should know about public key cryptography.?  (Computing Reviews, 9 September 2013)

More in Mathematics

The Infinite Game : From the bestselling author of Start With Why - Simon Sinek
How to Win At Chess : The Ultimate Guide for Beginners and Beyond - Levy Rozman
The Art of Gathering : How We Meet and Why It Matters - Priya Parker
The Maths Book : Big Ideas Simply Explained - DK

RRP $42.99

$32.99

23%
OFF
Humble Pi : A Comedy of Maths Errors - Matt Parker
Primary Mathematics : 4th Edition - Integrating Theory with Practice - Penelope Baker
Algebra Workbook Grades 6-8 : Algebra - Kumon
The Mending of Broken Bones : A Modern Guide to Classical Algebra - Paul Lockhart
The Black Swan : The Impact of the Highly Improbable - Nassim Nicholas Taleb
The Golden Ratio : Divine Beauty of Mathematics - Rafael Araujo

RRP $59.99

$43.75

27%
OFF
Nelson WAmaths Mathematics Applications : 11th Edition - Amanda Pettitt
Speed : How it Explains the World - Vaclav Smil

RRP $36.99

$29.75

20%
OFF
Intro to Geometry : Grades 6 - 8 - Kumon Publishing

RRP $24.99

$18.99

24%
OFF
Geometry : Grades 6 - 8 - Kumon Publishing

RRP $24.99

$18.75

25%
OFF
Grade 6 Geometry and Measurement : Kumon Math Workbooks - KUMON PUBLISHING