Public Key Cryptography:Applications and Attacks

Cover Image Copyright Year: 2013
Author(s): Lynn Margaret Batten
Book Type: Wiley-IEEE Press
Content Type : Books
Topics: Communication, Networking & Broadcasting ;  Components, Circuits, Devices & Systems ;  Computing & Processing
  • Print
  •   Click to expandTable of Contents

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Frontmatter

      Page(s): i - xvii
      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      The prelims comprise:
      Half Title
      Wiley Series Page
      Title
      Copyright
      Dedication
      Quotes
      Contents
      Preface
      Acknowledgments
      List of Figures View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Introduction

      Copyright Year: 2013

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

    • The Meaning of the Word Cryptography

    • Symmetric Key Cryptography

    • Public Key (Asymmetric) Cryptography

    • Key Establishment

    • Cryptography¿¿-¿¿More than just Hiding Secrets

    • Standards

    • Attacks

    • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Congruence Equations

    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Congruence Arithmetic

  • The Euclidean Algorithm¿¿-¿¿Finding Inverses

  • Discrete Logarithms and Diffie-Hellman Key Exchange

  • Attacking the Discrete Logarithm

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The Elgamal Scheme

    Public Key Cryptography:Applications and Attacks
    Page(s): 45 - 58
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:
    Primitive Roots
    The ElGamal Scheme
    Security of the ElGamal Scheme View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    The RSA Scheme

    Public Key Cryptography:Applications and Attacks
    Page(s): 59 - 79
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:
    Euler's Theorem
    The RSA Algorithm
    RSA Security
    Implementing RSA View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Elliptic Curve Cryptography

    Public Key Cryptography:Applications and Attacks
    Page(s): 81 - 101
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:
    Elliptic Curves and Elliptic Curve Groups
    Elliptic Curve Cryptography
    The Elliptic Curve Factoring Scheme View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Digital Signatures

    Public Key Cryptography:Applications and Attacks
    Page(s): 103 - 131
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:
    Hash Functions
    Digital Signature Schemes
    Attacks on Digital Signatures View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Primality Testing

    Public Key Cryptography:Applications and Attacks
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:

  • Fermat's Approach and Wilson's Theorem

  • The Miller-Selfridge-Rabin Primality Test

  • True Primality Tests

  • Mersenne Primes and the Lucas-Lehmer Test

  • Primes is in P

  • View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Factoring Methods

    Public Key Cryptography:Applications and Attacks
    Page(s): 151 - 173
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    This chapter contains sections titled:
    Fermat Again
    The Quadratic Sieve
    Pollard's P - 1 and rho Methods
    Continued Fractions and Factoring View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Appendix: Solutions to Problems

    Public Key Cryptography:Applications and Attacks
    Page(s): 175 - 192
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Notation

    Public Key Cryptography:Applications and Attacks
    Page(s): 193
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Bibliography

    Public Key Cryptography:Applications and Attacks
    Page(s): 195 - 198
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Index

    Public Key Cryptography:Applications and Attacks
    Page(s): 199 - 201
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    IEEE Press Series on Information and Communication Networks Security

    Public Key Cryptography:Applications and Attacks
    Page(s): 202
    Copyright Year: 2013

    Wiley-IEEE Press eBook Chapters

    No abstract. View full abstract»



  • On This Page

    Recently Published

    Learn More About