
Public Key Cryptosystems
Series: Cyber Shorts;
- Publisher's listprice GBP 44.99
-
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 2 277 Ft off)
- Discounted price 20 492 Ft (19 517 Ft + 5% VAT)
22 769 Ft
Availability
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher CRC Press
- Date of Publication 30 December 2024
- ISBN 9781032846231
- Binding Paperback
- No. of pages174 pages
- Size 234x156 mm
- Weight 320 g
- Language English
- Illustrations 5 Illustrations, black & white; 5 Line drawings, black & white; 77 Tables, black & white 675
Categories
Short description:
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
MoreLong description:
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary background, Chapters 1 and 2 are devoted to the selected fundamental concepts in cryptography mathematics and selected fundamental concepts in cryptography.
Chapter 3 is devoted to discrete logarithm problem (DLP), DLP-related public key cryptosystems, digital signature algorithms, and their cryptanalysis. In this chapter, the elliptic curve counterparts of the algorithms and the basic algorithms for the solution of DLP are also given. In Chapter 4, RSA public key cryptosystem, RSA digital signature algorithm, the basic cryptanalysis approaches, and the integer factorization methods are provided. Chapter 5 is devoted to GGH and NTRU public key cryptosystems, GGH and NTRU digital signature algorithms, and the basic cryptanalysis approaches, whereas Chapter 6 covers other topics including knapsack cryptosystems, identity-based public key cryptosystems, identity-based digital signature algorithms, Goldwasser-Micali probabilistic public key cryptosystem, and their cryptanalysis.
The book?s distinctive features:
- The book provides some fundamental mathematical and conceptual preliminaries required to understand the core parts of the book.
- The book comprises the selected public key cryptosystems, digital signature algorithms, and the basic cryptanalysis approaches for these cryptosystems and algorithms.
- The cryptographic algorithms and most of the solutions of the examples are provided in a structured table format to support easy learning.
- The concepts and algorithms are illustrated with examples, some of which are revisited multiple times to present alternative approaches.
- The details of the topics covered in the book are intentionally not presented; however, several references are provided at the end of each chapter so that the reader can read those references for more details.
More
Table of Contents:
Chapter 1: Selected Fundamental Concepts in Cryptography Mathematics. Chapter 2: Fundamental Concepts Related to Cryptography and Public Key Cryptosystems. Chapter 3: Discrete Logarithm Problem, Elliptic Curve Discrete Logarithm Problem, and the Related Public Key Cryptosystems and Digital Signature Algorithms. Chapter 4: RSA Public Key Cryptosystem, RSA Digital Signature Algorithm, and Integer Factorization. Chapter 5: Goldreich, Goldwasser, Halevi (GGH) Public Key Cryptosystem, GGH Digital Signature Algorithm, NTRU Public Key Cryptosystem, and NTRU Signature Scheme. Chapter 6: Other Selected Public Key Cryptosystems and Digital Signature Algorithms. Index.
More

Essentials of Functional MRI
44 025 HUF

Diary of a Wimpy Kid: Big Shot (Book 16)
6 574 HUF