• Notice

Type(s) de contenu et mode(s) de consultation : Texte noté : électronique

Auteur(s) : Yan, Song Y.  Voir les notices liées en tant qu'auteur

Titre(s) : Cybercryptography [Texte électronique] : applicable cryptography for cyberspace security / Song Y. Yan

Publication : Cham : Springer, copyright 2019

Description matérielle : 1 ressource dématérialisée

Note(s) : Notes bibliogr.
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9


Sujet(s) : Cryptographie  Voir les notices liées en tant que sujet
Cyberdéfense  Voir les notices liées en tant que sujet

Indice(s) Dewey :  005.824 (23e éd.) = Chiffrement des données (informatique)  Voir les notices liées en tant que sujet


Identifiants, prix et caractéristiques : ISBN 9783319725369. - ISBN 331972536X. - ISBN 9783319725345 (erroné). - ISBN 3319725343 (erroné)

Identifiant de la notice  : ark:/12148/cb45779173g

Notice n° :  FRBNF45779173 (notice reprise d'un réservoir extérieur)



Table des matières : Intro; Preface; Acknowledgments; Contents; About the Author; 1 Cyberspace Security and Cryptography; 1.1 Cyber and Cyberspace; Cyber and Cybernetics; Cyberspace; Problems for Sect. 1.1; 1.2 Cyberspace Security; Cyberspace Security; UK Cybersecurity Strategy; US and Canada's Cybersecurity Strategies; Australia and New Zealand Cybersecurity Strategies; Problems for Sect. 1.2; 1.3 Cybersecurity and Cryptography; Problems for Sect. 1.3; 1.4 Conclusions, Notes and Further Reading; References; 2 Mathematical Preliminaries; 2.1 Groups, Rings and Fields; Problems for Sect. 2.1; 2.2 Divisibility Theory
Problems for Sect. 2.22.3 Arithmetic Functions; Problems for Sect. 2.3; 2.4 Congruence Theory; Problems for Sect. 2.4; 2.5 Order, Primitive Root and Index; Problems for Sect. 2.5; 2.6 Theory of Elliptic Curves; Problems for Sect. 2.6; 2.7 Conclusions, Notes and Further Reading; References; 3 Computational Preliminaries; 3.1 Classical Computability Theory; Turing Machines; The Church-Turing Thesis; Decidability and Computability; Problems for Sect. 3.1; 3.2 Classical Complexity Theory; Complexity Classes; The Cook-Karp Thesis; Problems for Sect. 3.2; 3.3 Quantum Information and Computation
Problems for Sect. 3.33.4 Quantum Computability and Complexity; Problems for Sect. 3.4; 3.5 Conclusions, Notes and Further Reading; References; 4 Secret-Key Cryptography; 4.1 Secret-Key vs Public-Key Cryptography; Problems for Sect. 4.1; 4.2 Stream (Bit) Ciphers; Introduction to Stream Ciphers; The Vernam Cipher; Random Bit Generator; Problems for Sect. 4.2; 4.3 Monographic (Character) Ciphers; Caesar Cipher; Shift Transformation Ciphers; Affine Transformation Ciphers; Problems for Sect. 4.3; 4.4 Polygraphic (Block) Ciphers; Problems for Sect. 4.4; 4.5 Exponentiation Ciphers

Localiser ce document(1 Exemplaire)

Document numérique : 

1 partie d'exemplaire regroupée

ACQNUM-112454
support : document électronique dématérialisé