یادداشتهای مربوط به کتابنامه ، واژه نامه و نمایه های داخل اثر
متن يادداشت
Includes bibliographical references and index.
یادداشتهای مربوط به مندرجات
متن يادداشت
Intro; Preface; Acknowledgments; Contents; About the Author; 1 Cyberspace Security and Cryptography; 1.1 Cyber and Cyberspace; Cyber and Cybernetics; Cyberspace; Problems for Sect. 1.1; 1.2 Cyberspace Security; Cyberspace Security; UK Cybersecurity Strategy; US and Canada's Cybersecurity Strategies; Australia and New Zealand Cybersecurity Strategies; Problems for Sect. 1.2; 1.3 Cybersecurity and Cryptography; Problems for Sect. 1.3; 1.4 Conclusions, Notes and Further Reading; References; 2 Mathematical Preliminaries; 2.1 Groups, Rings and Fields; Problems for Sect. 2.1; 2.2 Divisibility Theory
متن يادداشت
Problems for Sect. 2.22.3 Arithmetic Functions; Problems for Sect. 2.3; 2.4 Congruence Theory; Problems for Sect. 2.4; 2.5 Order, Primitive Root and Index; Problems for Sect. 2.5; 2.6 Theory of Elliptic Curves; Problems for Sect. 2.6; 2.7 Conclusions, Notes and Further Reading; References; 3 Computational Preliminaries; 3.1 Classical Computability Theory; Turing Machines; The Church-Turing Thesis; Decidability and Computability; Problems for Sect. 3.1; 3.2 Classical Complexity Theory; Complexity Classes; The Cook-Karp Thesis; Problems for Sect. 3.2; 3.3 Quantum Information and Computation
متن يادداشت
Problems for Sect. 3.33.4 Quantum Computability and Complexity; Problems for Sect. 3.4; 3.5 Conclusions, Notes and Further Reading; References; 4 Secret-Key Cryptography; 4.1 Secret-Key vs Public-Key Cryptography; Problems for Sect. 4.1; 4.2 Stream (Bit) Ciphers; Introduction to Stream Ciphers; The Vernam Cipher; Random Bit Generator; Problems for Sect. 4.2; 4.3 Monographic (Character) Ciphers; Caesar Cipher; Shift Transformation Ciphers; Affine Transformation Ciphers; Problems for Sect. 4.3; 4.4 Polygraphic (Block) Ciphers; Problems for Sect. 4.4; 4.5 Exponentiation Ciphers
متن يادداشت
Residuosity Based CryptographyZero-Knowledge Proof; Problems and Exercises for Sect. 5.2; 5.3 Quantum Attacks of Factoring Based Cryptography; Relationships Between Factoring and Factoring Based Cryptography; Order Finding Problem; Quantum Order Computing; Quantum Integer Factorization; Quantum Algorithm for Breaking RSA; Exercises and Problems for Sect. 5.3; 5.4 Conclusions, Notes and Further Reading; References; 6 Logarithm Based Cryptography; 6.1 Discrete Logarithm Problem; Problems for Sect. 6.1; 6.2 Classic Solutions to Discrete Logarithm Problem; Shanks' Baby-Step Giant-Step Algorithm
بدون عنوان
0
بدون عنوان
8
بدون عنوان
8
بدون عنوان
8
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9.
یادداشتهای مربوط به سفارشات
منبع سفارش / آدرس اشتراک
Springer Nature
شماره انبار
com.springer.onix.9783319725369
ویراست دیگر از اثر در قالب دیگر رسانه
عنوان
Cybercryptography: Applicable Cryptography for Cyberspace Security.
شماره استاندارد بين المللي کتاب و موسيقي
9783319725345
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Cryptography.
موضوع مستند نشده
Data encryption (Computer science)
موضوع مستند نشده
Cryptography.
موضوع مستند نشده
Data encryption (Computer science)
مقوله موضوعی
موضوع مستند نشده
COM031000
موضوع مستند نشده
UMB
موضوع مستند نشده
UMB
موضوع مستند نشده
URY
رده بندی ديویی
شماره
005
.
8/24
ويراست
23
رده بندی کنگره
شماره رده
QA76
.
9
.
A25
نشانه اثر
Y36
2019
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )