Sold Out
Book Categories |
I Background
1 A bird's-eye view of modern cryptography 3
2 Elementary number theory and algebra background 23
II Algorithms
3 Linear algebra 71
4 Sieve algorithms 123
5 Brute force cryptanalysis 155
6 The birthday paradox: Sorting or not? 185
7 Birthday-based algorithms for functions 223
8 Birthday attacks through quadrisection 251
9 Fourier and Hadamard-Walsh transforms 273
10 Lattice reduction 309
11 Polynomial systems and Grabner base computations 337
III Applications
12 Attacks on stream ciphers 373
13 Lattice-based cryptanalysis 397
14 Elliptic curves and pairings 417
15 Index calculus algorithms 439
References 471
Lists 491
Index 497
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionAlgorithmic Cryptanalysis
X
This Item is in Your InventoryAlgorithmic Cryptanalysis
X
You must be logged in to review the productsX
X
X
Add Algorithmic Cryptanalysis, Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textua, Algorithmic Cryptanalysis to the inventory that you are selling on WonderClubX
X
Add Algorithmic Cryptanalysis, Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textua, Algorithmic Cryptanalysis to your collection on WonderClub |