Item added to your basket
You have 0 items in your basket
Subtotal: 0
Discount (10% off): 0
Total cost: 0
Basket / Checkout
Shopping cart
£0.00

Public Key Cryptography: Applications and Attacks - IEEE Press Series on Information and Communication Networks Security

2 (1 ratings by Goodreads)
A Hardback by

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based such as the discrete logarithm problem and the difficulty of factoring integers.

The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:

Explains fundamentals of public key cryptography

Offers numerous examples and exercises

Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam

Provides solutions to the end-of-chapter problems

Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.


show more
A Hardback by
£44.79 New RRP £79.95
You save £35.16

12648

8

Condition - Only 1 left

Free UK Delivery

FREE Returns within 60 days

Description

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based such as the discrete logarithm problem and the difficulty of factoring integers.

The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. Public Key Cryptography:

Explains fundamentals of public key cryptography

Offers numerous examples and exercises

Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam

Provides solutions to the end-of-chapter problems

Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.


show more

Book details

  • Book author:
  • Format:Hardback
  • Pages:224 Pages
  • Dimensions:236 x 160 x 23 mm
  • Publication date:03/12/2013
  • Publisher:John Wiley & Sons Inc
  • ISBN13:9781118317129
Note:
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.

Note

The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.