Normal view MARC view ISBD view

Computational cryptography : algorithmic aspects of cryptology

By: Bos, Joppe W. ed.
Contributor(s): Stam, Martijn [ed.].
Series: London Mathematical Society lecture note series ; 469.Publisher: Cambridge : Cambridge University Press, 2022Description: xii, 387 p. ; ill., 23 cm.ISBN: 9781108795937.Subject(s): Cryptography | Approximation regime | BKZ | CFRAC | Coppersmith method | Digital signature | ElGamel encryption | Gaussian heuristic | Hash function | IPsec | L-function | Modular multiplication | NIST | rho method | P1 method | Quantum computer | SSl | Wiener's attack | Hash functionDDC classification: 005.824 Summary: The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
Tags from this library: No tags from this library for this title. Log in to add tags.

Includes bibliographical references and index.

The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.

There are no comments for this item.

Log in to your account to post a comment.

Powered by Koha