[图书][B] Handbook of applied cryptography

AJ Menezes, PC Van Oorschot, SA Vanstone - 2018 - taylorfrancis.com
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an
important discipline that is not only the subject of an enormous amount of research, but …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[图书][B] CRC concise encyclopedia of mathematics

EW Weisstein - 2002 - taylorfrancis.com
Upon publication, the first edition of the CRC Concise Encyclopedia of Mathematics
received overwhelming accolades for its unparalleled scope, readability, and utility. It soon …

[图书][B] Undergraduate Texts in Mathematics

S Axler, KA Ribet - 2015 - Springer
In Chapter 1, we have seen how the algebra of the polynomial rings k [x1,..., xn] and the
geometry of affine algebraic varieties are linked. In this chapter, we will study the method of …

[图书][B] Algorithmic number theory: Efficient algorithms

E Bach, JO Shallit - 1996 - books.google.com
Algorithmic Number Theory provides a thorough introduction to the design and analysis of
algorithms for problems from the theory of numbers. Although not an elementary textbook, it …

[图书][B] Handbook of discrete and combinatorial mathematics

KH Rosen - 1999 - books.google.com
The importance of discrete and combinatorial mathematics continues to increase as the
range of applications to computer science, electrical engineering, and the biological …

Теоретико-числовые алгоритмы в криптографии

ЕР Данилкова - ШКОЛА МОЛОДЫХ УЧЕНЫХ, 2021 - elibrary.ru
В статье рассмотрены некоторые элементы теории чисел и показано, как они
используются в современной криптографии. В качестве примеров выбраны наиболее …

[图书][B] Algebraic cryptanalysis

G Bard - 2009 - books.google.com
Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able
to read the cryptanalytic literature. This book is divided into three parts: Part One covers the …

[图书][B] Компьютерная безопасность. Криптографические методы защиты

А Петров - 2022 - books.google.com
В книге рассматриваются актуальные вопросы защиты данных при создании
распределенных информационных систем масштаба предприятия, приводятся …

[图书][B] Number theory for computing

SY Yan - 2013 - books.google.com
Modern cryptography depends heavily on number theory, with primality test ing, factoring,
discrete logarithms (indices), and elliptic curves being perhaps the most prominent subject …