logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Cybercryptography Applicable Cryptography For Cyberspace Security 1st Ed Song Y Yan

  • SKU: BELL-7321984
Cybercryptography Applicable Cryptography For Cyberspace Security 1st Ed Song Y Yan
$ 31.00 $ 45.00 (-31%)

4.0

96 reviews

Cybercryptography Applicable Cryptography For Cyberspace Security 1st Ed Song Y Yan instant download after payment.

Publisher: Springer International Publishing
File Extension: PDF
File size: 10.86 MB
Author: Song Y. Yan
ISBN: 9783319725345, 9783319725369, 3319725343, 331972536X
Language: English
Year: 2019
Edition: 1st ed.

Product desciption

Cybercryptography Applicable Cryptography For Cyberspace Security 1st Ed Song Y Yan by Song Y. Yan 9783319725345, 9783319725369, 3319725343, 331972536X instant download after payment.

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively.

Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9. This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.

Related Products