You can manage bookmarks using lists, please log in to your user account for this.
Media type:
E-Book
Title:
Algorithmic strategies for solving complex problems in cryptography
Contains:
Chapter 1. Recent developments in cryptography : a survey / Dr. Kannan Balasubramanian -- Chapter 2. Problems in cryptography and cryptanalysis / Dr. Kannan Balasubramanian and M. Rajakani -- Chapter 3. Variants of the Diffie-Hellman problem / Dr. Kannan Balasubramanian -- Chapter 4. Secure group key agreement protocols / Dr. Kannan Balasubramanian and K. Mala -- Chapter 5. Hash functions and their applications / Dr. Kannan Balasubramanian -- Chapter 6. Efficient implementation of digital signature algorithms / Sumathi Doraikannan -- Chapter 7. Attacks on implementation of cryptographic algorithms / Dr. Kannan Balasubramanian and M. Rajakani -- Chapter 8. Homomorphic encryption schemes : a survey / Dr. Kannan Balasubramanian and Mrs Jayanthi Mathanan -- Chapter 9. Zero knowledge proofs : a survey / Dr. Kannan Balasubramanian and K. Mala -- Chapter 10. Cryptographic voting protocols / Dr. Kannan Balasubramanian and Mrs Jayanthi Mathanan -- Chapter 11. Securing public key encryption against chosen ciphertext attacks / Dr. Kannan Balasubramanian -- Chapter 12. Secure two party computation / Dr. Kannan Balasubramanian -- Chapter 13. Secure multiparty computation / Dr. Kannan Balasubramanian and M. Rajakani -- Chapter 14. Secure bootstrapping using the trusted platform module / Dr. Kannan Balasubramanian, Mr. Ahmed Mahmoud Abbas -- Chapter 15. Experiments with the cryptool software / Dr. Kannan Balasubramanian -- Chapter 16. A software library for multiprecision arithmetic / Dr. Kannan Balasubramanian, Mr. Ahmed Mahmoud Abbas -- Chapter 17. Integer factoring algorithms / Dr. Kannan Balasubramanian, Mr. Ahmed Mahmoud Abbas -- Chapter 18. The quadratic sieve algorithm for integer factoring / Dr. Kannan Balasubramanian and M. Rajakani
Footnote:
Includes bibliographical references and index
Restricted to subscribers or individual electronic text purchasers
Mode of access: World Wide Web
Description:
"This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the problem and the performance results of the technique in terms of time taken and storage capacity used"--