|
|
|
|
LEADER |
05509nam a2200565Ii 4500 |
001 |
b190bb34-b90d-4a12-b98e-c28d66033da4 |
005 |
20240811000000.0 |
008 |
181215s2019 sz ob 001 0 eng d |
015 |
|
|
|a GBB935076
|2 bnb
|
016 |
7 |
|
|a 019213986
|2 Uk
|
019 |
|
|
|a 1078943112
|a 1086468991
|a 1117822732
|a 1122773562
|a 1122813686
|a 1156344948
|
020 |
|
|
|a 3319725351
|
020 |
|
|
|a 331972536X
|q (electronic book)
|
020 |
|
|
|a 9783319725352
|q (print)
|
020 |
|
|
|a 9783319725369
|q (electronic book)
|
020 |
|
|
|z 3319725343
|
020 |
|
|
|z 9783319725345
|
024 |
7 |
|
|a 10.1007/978-3-319-72536-9
|2 doi
|
035 |
|
|
|a (OCoLC)1078999410
|z (OCoLC)1078943112
|z (OCoLC)1086468991
|z (OCoLC)1117822732
|z (OCoLC)1122773562
|z (OCoLC)1122813686
|z (OCoLC)1156344948
|
035 |
|
9 |
|a (OCLCCM-CC)1078999410
|
037 |
|
|
|a com.springer.onix.9783319725369
|b Springer Nature
|
040 |
|
|
|a EBLCP
|b eng
|e rda
|e pn
|c EBLCP
|d GW5XE
|d OCLCF
|d CAUOI
|d YDX
|d MERER
|d YDXIT
|d UKMGB
|d OH1
|d ESU
|d UKAHL
|d LEAUB
|d CEF
|d LVT
|d LEATE
|d OCLCQ
|d VT2
|
049 |
|
|
|a MAIN
|
050 |
|
4 |
|a QA76.9.A25
|b Y36 2019
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a UMB
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
100 |
1 |
|
|a Yan, Song Y.,
|e author
|
245 |
1 |
0 |
|a Cybercryptography :
|b applicable cryptography for cyberspace security /
|c Song Y. Yan
|
264 |
|
1 |
|a Cham, Switzerland :
|b Springer,
|c [2019]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
504 |
|
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Intro; Preface; Acknowledgments; Contents; About the Author; 1 Cyberspace Security and Cryptography; 1.1 Cyber and Cyberspace; Cyber and Cybernetics; Cyberspace; Problems for Sect. 1.1; 1.2 Cyberspace Security; Cyberspace Security; UK Cybersecurity Strategy; US and Canada's Cybersecurity Strategies; Australia and New Zealand Cybersecurity Strategies; Problems for Sect. 1.2; 1.3 Cybersecurity and Cryptography; Problems for Sect. 1.3; 1.4 Conclusions, Notes and Further Reading; References; 2 Mathematical Preliminaries; 2.1 Groups, Rings and Fields; Problems for Sect. 2.1; 2.2 Divisibility Theory
|
505 |
8 |
|
|a Problems for Sect. 2.22.3 Arithmetic Functions; Problems for Sect. 2.3; 2.4 Congruence Theory; Problems for Sect. 2.4; 2.5 Order, Primitive Root and Index; Problems for Sect. 2.5; 2.6 Theory of Elliptic Curves; Problems for Sect. 2.6; 2.7 Conclusions, Notes and Further Reading; References; 3 Computational Preliminaries; 3.1 Classical Computability Theory; Turing Machines; The Church-Turing Thesis; Decidability and Computability; Problems for Sect. 3.1; 3.2 Classical Complexity Theory; Complexity Classes; The Cook-Karp Thesis; Problems for Sect. 3.2; 3.3 Quantum Information and Computation
|
505 |
8 |
|
|a Problems for Sect. 3.33.4 Quantum Computability and Complexity; Problems for Sect. 3.4; 3.5 Conclusions, Notes and Further Reading; References; 4 Secret-Key Cryptography; 4.1 Secret-Key vs Public-Key Cryptography; Problems for Sect. 4.1; 4.2 Stream (Bit) Ciphers; Introduction to Stream Ciphers; The Vernam Cipher; Random Bit Generator; Problems for Sect. 4.2; 4.3 Monographic (Character) Ciphers; Caesar Cipher; Shift Transformation Ciphers; Affine Transformation Ciphers; Problems for Sect. 4.3; 4.4 Polygraphic (Block) Ciphers; Problems for Sect. 4.4; 4.5 Exponentiation Ciphers
|
505 |
8 |
|
|a Residuosity Based CryptographyZero-Knowledge Proof; Problems and Exercises for Sect. 5.2; 5.3 Quantum Attacks of Factoring Based Cryptography; Relationships Between Factoring and Factoring Based Cryptography; Order Finding Problem; Quantum Order Computing; Quantum Integer Factorization; Quantum Algorithm for Breaking RSA; Exercises and Problems for Sect. 5.3; 5.4 Conclusions, Notes and Further Reading; References; 6 Logarithm Based Cryptography; 6.1 Discrete Logarithm Problem; Problems for Sect. 6.1; 6.2 Classic Solutions to Discrete Logarithm Problem; Shanks' Baby-Step Giant-Step Algorithm
|
520 |
|
|
|a This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on February 14, 2019)
|
650 |
|
0 |
|a Cryptography
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
7 |
|a Cryptography
|2 fast
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|
655 |
|
4 |
|a Electronic books
|
776 |
0 |
8 |
|i Print version:
|a Yan, Song Y
|t Cybercryptography: Applicable Cryptography for Cyberspace Security.
|d Cham : Springer, ©2018
|z 9783319725345
|
999 |
1 |
0 |
|i b190bb34-b90d-4a12-b98e-c28d66033da4
|l 11761358
|s US-ICU
|m cybercryptographyapplicable_cryptography_for_cyberspace_security___________2019_______sprina________________________________________yan__song_y________________________e
|