Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : Yan, Song Y.
Titre(s) : Cybercryptography [Texte électronique] : applicable cryptography for cyberspace security / Song Y. Yan
Publication : Cham : Springer, copyright 2019
Description matérielle : 1 ressource dématérialisée
Note(s) : Notes bibliogr.
This book provides the basic theory, techniques, and algorithms of modern cryptography
that are applicable to network and cyberspace security. It consists of the following
nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace
and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical
and computational preliminaries, respectively. Chapters 4 discusses the basic ideas
and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic
ideas and systems of public-key cryptography based on integer factorization, discrete
logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented
in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in
Chapter 9
Sujet(s) : Cryptographie
Cyberdéfense
Indice(s) Dewey :
005.824 (23e éd.) = Chiffrement des données (informatique)
Identifiants, prix et caractéristiques : ISBN 9783319725369. - ISBN 331972536X. - ISBN 9783319725345 (erroné). - ISBN 3319725343
(erroné)
Identifiant de la notice : ark:/12148/cb45779173g
Notice n° :
FRBNF45779173
(notice reprise d'un réservoir extérieur)
Table des matières : Intro; Preface; Acknowledgments; Contents; About the Author; 1 Cyberspace Security
and Cryptography; 1.1 Cyber and Cyberspace; Cyber and Cybernetics; Cyberspace; Problems
for Sect. 1.1; 1.2 Cyberspace Security; Cyberspace Security; UK Cybersecurity Strategy;
US and Canada's Cybersecurity Strategies; Australia and New Zealand Cybersecurity
Strategies; Problems for Sect. 1.2; 1.3 Cybersecurity and Cryptography; Problems for
Sect. 1.3; 1.4 Conclusions, Notes and Further Reading; References; 2 Mathematical
Preliminaries; 2.1 Groups, Rings and Fields; Problems for Sect. 2.1; 2.2 Divisibility
Theory
Problems for Sect. 2.22.3 Arithmetic Functions; Problems for Sect. 2.3; 2.4 Congruence
Theory; Problems for Sect. 2.4; 2.5 Order, Primitive Root and Index; Problems for
Sect. 2.5; 2.6 Theory of Elliptic Curves; Problems for Sect. 2.6; 2.7 Conclusions,
Notes and Further Reading; References; 3 Computational Preliminaries; 3.1 Classical
Computability Theory; Turing Machines; The Church-Turing Thesis; Decidability and
Computability; Problems for Sect. 3.1; 3.2 Classical Complexity Theory; Complexity
Classes; The Cook-Karp Thesis; Problems for Sect. 3.2; 3.3 Quantum Information and
Computation
Problems for Sect. 3.33.4 Quantum Computability and Complexity; Problems for Sect.
3.4; 3.5 Conclusions, Notes and Further Reading; References; 4 Secret-Key Cryptography;
4.1 Secret-Key vs Public-Key Cryptography; Problems for Sect. 4.1; 4.2 Stream (Bit)
Ciphers; Introduction to Stream Ciphers; The Vernam Cipher; Random Bit Generator;
Problems for Sect. 4.2; 4.3 Monographic (Character) Ciphers; Caesar Cipher; Shift
Transformation Ciphers; Affine Transformation Ciphers; Problems for Sect. 4.3; 4.4
Polygraphic (Block) Ciphers; Problems for Sect. 4.4; 4.5 Exponentiation Ciphers