找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Cryptography Made Simple; Nigel P. Smart Textbook 2016 Springer Nature Switzerland AG 2016 Block Ciphers.Digital Signatures.Discrete Logar

[復(fù)制鏈接]
查看: 29376|回復(fù): 58
樓主
發(fā)表于 2025-3-21 16:29:58 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Cryptography Made Simple
編輯Nigel P. Smart
視頻videohttp://file.papertrans.cn/241/240562/240562.mp4
概述Author is a leading researcher and practitioner in cryptography.Textbook emphasizes security definitions.Suitable for undergraduate courses in computer science, mathematics and engineering.Includes su
叢書名稱Information Security and Cryptography
圖書封面Titlebook: Cryptography Made Simple;  Nigel P. Smart Textbook 2016 Springer Nature Switzerland AG 2016 Block Ciphers.Digital Signatures.Discrete Logar
描述In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout..The author balances a largely non-rigorous style — many proofs are sketched only — with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading..This is a suitable textbook for advanced undergraduate and graduate students in computer science, mathematics and engineering, and for self-study byprofessionals in information security. While the appendix summarizes most of the basic algebra and notation required, it is assumed that the reader has a basic knowledge of discrete mathematics, probability, and elementary calculus..
出版日期Textbook 2016
關(guān)鍵詞Block Ciphers; Digital Signatures; Discrete Logarithms; Elliptic Curves; Finite Fields; Hash Functions; Hi
版次1
doihttps://doi.org/10.1007/978-3-319-21936-3
isbn_softcover978-3-319-37309-6
isbn_ebook978-3-319-21936-3Series ISSN 1619-7100 Series E-ISSN 2197-845X
issn_series 1619-7100
copyrightSpringer Nature Switzerland AG 2016
The information of publication is updating

書目名稱Cryptography Made Simple影響因子(影響力)




書目名稱Cryptography Made Simple影響因子(影響力)學(xué)科排名




書目名稱Cryptography Made Simple網(wǎng)絡(luò)公開度




書目名稱Cryptography Made Simple網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Cryptography Made Simple被引頻次




書目名稱Cryptography Made Simple被引頻次學(xué)科排名




書目名稱Cryptography Made Simple年度引用




書目名稱Cryptography Made Simple年度引用學(xué)科排名




書目名稱Cryptography Made Simple讀者反饋




書目名稱Cryptography Made Simple讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-22 00:11:32 | 只看該作者
板凳
發(fā)表于 2025-3-22 02:59:38 | 只看該作者
Dingwei Liu,Zhenyu Li,Zhibin ZhangMuch of this book will be spent looking at the applications of modular arithmetic, since it is fundamental to modern cryptography and public key cryptosystems in particular. Hence, in this chapter we introduce the basic concepts and techniques we shall require.
地板
發(fā)表于 2025-3-22 08:01:08 | 只看該作者
5#
發(fā)表于 2025-3-22 11:50:59 | 只看該作者
Dingwei Liu,Zhenyu Li,Zhibin ZhangIn Chapter 2 we examined the hard problem of FACTOR. This gave us some (hopefully) one-way functions, namely the RSA function, the squaring function modulo a composite and the function which multiplies two large numbers together.
6#
發(fā)表于 2025-3-22 16:14:07 | 只看該作者
Lecture Notes in Computer ScienceIn this chapter we present the concept of a lattice. Traditionally in cryptography lattices have been used in cryptanalysis to break systems, and we shall see applications of this in Chapter 15. However, recently they have also been used to construct cryptographic systems with special properties, as we shall see in Chapter 17.
7#
發(fā)表于 2025-3-22 19:34:10 | 只看該作者
Web Information Systems and ApplicationsAn encryption algorithm, or cipher, is a means of transforming plaintext into ciphertext under the control of a secret key. This process is called encryption or encipherment.
8#
發(fā)表于 2025-3-22 23:21:03 | 只看該作者
Linlin Ding,Yiming Han,Mo Li,Dong LiInformation theory is one of the foundations of computer science. In this chapter we will examine its relationship to cryptography. But we shall not assume any prior familiarity with information theory.
9#
發(fā)表于 2025-3-23 03:44:41 | 只看該作者
Peng ZhaoWe can interpret a pseudo-random function as a stream cipher. Let {..}. be a PRF family with codomain C of bitstrings of length .. The PRF family immediately defines a stream cipher for messages of length . bits. We encrypt a message by setting
10#
發(fā)表于 2025-3-23 05:41:39 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-11 02:00
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
阜南县| 兴海县| 平阴县| 灵丘县| 丰都县| 昌邑市| 泉州市| 冷水江市| 绥江县| 德江县| 孝昌县| 柳河县| 新丰县| 昌平区| 中牟县| 沙湾县| 确山县| 江城| 武义县| 醴陵市| 永寿县| 定襄县| 临泉县| 金寨县| 灵川县| 大姚县| 永宁县| 东安县| 安龙县| 和静县| 寿阳县| 霍林郭勒市| 兴化市| 隆尧县| 微山县| 南京市| 香河县| 沛县| 华阴市| 洞口县| 寿阳县|