Shipping Through the Holidays β˜€οΈπŸ“¦

New Year, New You Sale β˜€οΈ- Up to 20% off 500+ books!

Public Key Cryptography

Applications and Attacks
Book Hero Magic crafted this summary to help describe this book. While it's new and still learning, it may not be perfect - your feedback is welcome! Summary
Public Key Cryptography by Lynn Margaret Batten provides an insightful exploration into the field of cryptography, focusing on the principles and applications of public key systems. It delves into the mathematical foundations that underpin encryption algorithms, while also discussing practical security challenges and solutions. Ideal for those interested in the technological aspects of secure communication, it offers both theoretical and practical insights.
Read More
Format: Hardback
TEMPORARILY OUT OF STOCK Please add to wishlist to be notified when back in stock

Sorry, we're currently out of stock of Public Key Cryptography. Please add to your Wishlist and we'll send you an email as soon as it's back in stock.

Book Hero Magic created this recommendation. While it's new and still learning, it may not be perfect - your feedback is welcome! IS THIS YOUR NEXT READ?

If you have a keen interest in computing and technology or are eager to understand the fundamental principles of encryption systems, you will likely find this book compelling. With its detailed exploration of how public key cryptography underpins data security in the digital age, this work will engage anyone fascinated by the science behind securing information.

Book Hero thinking about your next read

Public Key Cryptography

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them.

Book Hero Magic formatted this description to make it easier to read. While it's new and still learning, it may not be perfect - your feedback is welcome! Description

Complete coverage of the current major public key cryptosystems, their underlying mathematics, and the most common techniques used in attacking them. Public Key Cryptography: Applications and Attacks introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes.

It provides the underlying mathematics needed to build and study these schemes as required, and examines attacks on said schemes via the mathematical problems on which they are basedβ€”such as the discrete logarithm problem and the difficulty of factoring integers.

The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems, with full solutions for odd-numbered problems provided in the Appendix.

Public Key Cryptography:

  • Explains fundamentals of public key cryptography
  • Offers numerous examples and exercises
  • Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam
  • Provides solutions to the end-of-chapter problems

Public Key Cryptography provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.

Series: IEEE Press Series on Information and Communication Networks Security

View all

Book Hero Magic summarised reviews for this book. While it's new and still learning, it may not be perfect - your feedback is welcome! HOW HAS THIS BEEN REVIEWED?

Public Key Cryptography by Lynn Margaret Batten is praised for its pedagogical value and clear exposition of mathematical methods integral to public key cryptography, featuring numerous computational examples and rigorous treatment. It is recommended as a university-level text for third-year students and beyond, and is suggested as essential reading for computer scientists seeking to deepen their understanding of public key cryptography.

Book Hero reading reviews

Book Details

INFORMATION

ISBN: 9781118317129

Publisher: John Wiley & Sons Inc

Format: Hardback

Date Published: 12 March 2013

Country: United States

Imprint: Wiley-IEEE Press

Audience: Professional and scholarly

DIMENSIONS

Spine width: 23.0mm

Width: 160.0mm

Height: 236.0mm

Weight: 476g

Pages: 224

About the Author

Professor Lynn Batten holds the Deakin Chair in Mathematics and is the Director of the Information Security Research Group at Deakin University. Her research interests include combinatorial geometry, computer network security and computational chemistry. As Associate Dean for Academic and Industrial Research at the University of Manitoba, her former institution, she established a number of agreements between the University and various industry and government sectors.

More from Computing & Technology

View all

Why buy from us?

Book Hero is not a chain store or big box retailer. We're an independent 100% NZ-owned business on a mission to help more Kiwis rediscover a love of books and reading!

Service & Delivery

Service & Delivery

Our warehouse in Auckland holds over 80,000 books and puzzles in-stock so you're not waiting for your order to arrive from overseas.

Auckland Bookstore

Auckland Bookstore

We're primarily an online store, but for your convenience you can pick up your order for free from our bookstore, which is right next door to our warehouse in Hobsonville.

Our Gifting Service

Our Gifting Service

Books make wonderful thoughtful gifts and we're here to help with gift-wrapping and cards. We can even send your gift directly to your loved one.