Asymmetric-Key Cryptosystems - Rsa, Public-Key Cryptography, Fermat Pseudoprime, Elliptic Curve Cryptography, Diffie-Hellman Key Exchange, Elgamal En (Paperback)


Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 95. Chapters: RSA, Public-key cryptography, Fermat pseudoprime, Elliptic curve cryptography, Diffie-Hellman key exchange, ElGamal encryption, Digital Signature Algorithm, Merkle-Hellman knapsack cryptosystem, XTR, NTRUEncrypt, Schoof's algorithm, Primality test, Quantum digital signature, Public key infrastructure, Hidden Field Equations, McEliece cryptosystem, Rabin cryptosystem, Wiener's Attack, Web of trust, Lamport signature, Hyperelliptic curve cryptography, Secure Remote Password protocol, Paillier cryptosystem, Transient-key cryptography, Three-pass protocol, Public key fingerprint, Cramer-Shoup cryptosystem, Diffie-Hellman problem, Unbalanced Oil and Vinegar, Elliptic Curve DSA, Signcryption, Cayley-Purser algorithm, Goldwasser-Micali cryptosystem, Blum-Goldwasser cryptosystem, Registration authority, Merkle signature scheme, Implicit certificate, ECC patents, Optimal asymmetric encryption padding, Decisional Diffie-Hellman assumption, Table of costs of operations in elliptic curves, Niederreiter cryptosystem, SAFE-BioPharma Association, RSA problem, SPEKE, Key encapsulation, IEEE P1363, MQV, ElGamal signature scheme, Rabin signature algorithm, XDH assumption, CEILIDH, Damgard-Jurik cryptosystem, NTRUSign, Okamoto-Uchiyama cryptosystem, Jumbleme, Integrated Encryption Scheme, Elliptic curve Diffie-Hellman, Naccache-Stern cryptosystem, Encrypted key exchange, Merkle's Puzzles, Schoof-Elkies-Atkin algorithm, Benaloh cryptosystem, Computational Diffie-Hellman assumption, Schnorr signature, Naccache-Stern knapsack cryptosystem, Efficient Probabilistic Public-Key Encryption Scheme, Certificate-based encryption, Schmidt-Samoa cryptosystem, Full Domain Hash, Schnorr group, Certificateless cryptography, Threshold cryptosystem, Strong RSA assumption, Distributed key generation, Bilateral key...

R563

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles5630
Free Delivery
Delivery AdviceOut of stock

Toggle WishListAdd to wish list
Review this Item

Product Description

Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 95. Chapters: RSA, Public-key cryptography, Fermat pseudoprime, Elliptic curve cryptography, Diffie-Hellman key exchange, ElGamal encryption, Digital Signature Algorithm, Merkle-Hellman knapsack cryptosystem, XTR, NTRUEncrypt, Schoof's algorithm, Primality test, Quantum digital signature, Public key infrastructure, Hidden Field Equations, McEliece cryptosystem, Rabin cryptosystem, Wiener's Attack, Web of trust, Lamport signature, Hyperelliptic curve cryptography, Secure Remote Password protocol, Paillier cryptosystem, Transient-key cryptography, Three-pass protocol, Public key fingerprint, Cramer-Shoup cryptosystem, Diffie-Hellman problem, Unbalanced Oil and Vinegar, Elliptic Curve DSA, Signcryption, Cayley-Purser algorithm, Goldwasser-Micali cryptosystem, Blum-Goldwasser cryptosystem, Registration authority, Merkle signature scheme, Implicit certificate, ECC patents, Optimal asymmetric encryption padding, Decisional Diffie-Hellman assumption, Table of costs of operations in elliptic curves, Niederreiter cryptosystem, SAFE-BioPharma Association, RSA problem, SPEKE, Key encapsulation, IEEE P1363, MQV, ElGamal signature scheme, Rabin signature algorithm, XDH assumption, CEILIDH, Damgard-Jurik cryptosystem, NTRUSign, Okamoto-Uchiyama cryptosystem, Jumbleme, Integrated Encryption Scheme, Elliptic curve Diffie-Hellman, Naccache-Stern cryptosystem, Encrypted key exchange, Merkle's Puzzles, Schoof-Elkies-Atkin algorithm, Benaloh cryptosystem, Computational Diffie-Hellman assumption, Schnorr signature, Naccache-Stern knapsack cryptosystem, Efficient Probabilistic Public-Key Encryption Scheme, Certificate-based encryption, Schmidt-Samoa cryptosystem, Full Domain Hash, Schnorr group, Certificateless cryptography, Threshold cryptosystem, Strong RSA assumption, Distributed key generation, Bilateral key...

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Books LLC, Wiki Series

Country of origin

United States

Release date

October 2012

Availability

Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available.

First published

October 2012

Authors

Editors

Creators

Dimensions

246 x 189 x 5mm (L x W x T)

Format

Paperback - Trade

Pages

96

ISBN-13

978-1-155-65774-5

Barcode

9781155657745

Categories

LSN

1-155-65774-8



Trending On Loot