Cart (Loading....) | Create Account
Close category search window
 

Public Key Cryptography:Applications and Attacks

Cover Image Copyright Year: 2013
Author(s): Batten, L.
Publisher: Wiley-IEEE Press
Content Type : Books & eBooks
Topics: Communication, Networking & Broadcasting ;  Components, Circuits, Devices & Systems ;  Computing & Processing (Hardware/Software)
  • Print
  •   Click to expandTable of Contents

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Frontmatter

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.fmatter
      Page(s): i - xvii
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      The prelims comprise:
      Half Title
      Wiley Series Page
      Title
      Copyright
      Dedication
      Quotes
      Contents
      Preface
      Acknowledgments
      List of Figures View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Introduction

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch1
      Page(s): 1 - 11
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      The Meaning of the Word Cryptography
      Symmetric Key Cryptography
      Public Key (Asymmetric) Cryptography
      Key Establishment
      Cryptography - More than just Hiding Secrets
      Standards
      Attacks View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Congruence Equations

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch2
      Page(s): 13 - 43
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Congruence Arithmetic
      The Euclidean Algorithm - Finding Inverses
      Discrete Logarithms and Diffie-Hellman Key Exchange
      Attacking the Discrete Logarithm View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      The Elgamal Scheme

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch3
      Page(s): 45 - 58
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Primitive Roots
      The ElGamal Scheme
      Security of the ElGamal Scheme View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      The RSA Scheme

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch4
      Page(s): 59 - 79
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Euler's Theorem
      The RSA Algorithm
      RSA Security
      Implementing RSA View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Elliptic Curve Cryptography

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch5
      Page(s): 81 - 101
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Elliptic Curves and Elliptic Curve Groups
      Elliptic Curve Cryptography
      The Elliptic Curve Factoring Scheme View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Digital Signatures

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch6
      Page(s): 103 - 131
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Hash Functions
      Digital Signature Schemes
      Attacks on Digital Signatures View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Primality Testing

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch7
      Page(s): 133 - 150
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Fermat's Approach and Wilson's Theorem
      The Miller-Selfridge-Rabin Primality Test
      True Primality Tests
      Mersenne Primes and the Lucas-Lehmer Test
      Primes is in P View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Factoring Methods

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.ch8
      Page(s): 151 - 173
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:
      Fermat Again
      The Quadratic Sieve
      Pollard's P - 1 and rho Methods
      Continued Fractions and Factoring View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Appendix: Solutions to Problems

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.app1
      Page(s): 175 - 192
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      No abstract. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Notation

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.oth1
      Page(s): 193
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      No abstract. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Bibliography

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.biblio
      Page(s): 195 - 198
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      No abstract. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Index

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.index
      Page(s): 199 - 201
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      No abstract. View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      IEEE Press Series on Information and Communication Networks Security

      Batten, L.
      Public Key Cryptography:Applications and Attacks

      DOI: 10.1002/9781118482261.scard
      Page(s): 202
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      No abstract. View full abstract»




| Create Account

IEEE Account

Purchase Details

Profile Information

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.