找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Introduction to Cryptography with Maple; José Luis Gómez Pardo Textbook 2013 Springer-Verlag Berlin Heidelberg 2013 Maple.algorithmic numb

[復(fù)制鏈接]
查看: 8711|回復(fù): 47
樓主
發(fā)表于 2025-3-21 16:47:23 | 只看該作者 |倒序?yàn)g覽 |閱讀模式
書目名稱Introduction to Cryptography with Maple
編輯José Luis Gómez Pardo
視頻videohttp://file.papertrans.cn/474/473583/473583.mp4
概述Employs a programming-oriented approach to study the most important cryptographic schemes and cryptanalytic attacks.Provides implementations of the algorithms and schemes and examples of realistic siz
圖書封面Titlebook: Introduction to Cryptography with Maple;  José Luis Gómez Pardo Textbook 2013 Springer-Verlag Berlin Heidelberg 2013 Maple.algorithmic numb
描述.This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects, emphasizing precise security definitions based on methodological tools such as complexity and randomness, and of the mathematical aspects, with emphasis on number-theoretic algorithms and their applications to cryptography and cryptanalysis, is integrated with the programming approach, thus providing implementations of the algorithms and schemes as well as examples of realistic size.?.A distinctive feature of the author‘s approach is the use of Maple as a programming environment in which not just the cryptographic primitives but also the most important cryptographic schemes are implemented following the recommendations of standards bodies such as NIST, with many of the known cryptanalytic attacks implemented as well. The purpose of the Maple implementations is to let the reader experiment and learn, and for this reason the author includes numerous examples. The book discusses important recent subjects such as homomorphic encryption, identity-based cryptograp
出版日期Textbook 2013
關(guān)鍵詞Maple; algorithmic number theory; block ciphers; ciphers; digital signatures; elliptic curve cryptography
版次1
doihttps://doi.org/10.1007/978-3-642-32166-5
isbn_softcover978-3-642-44621-4
isbn_ebook978-3-642-32166-5
copyrightSpringer-Verlag Berlin Heidelberg 2013
The information of publication is updating

書目名稱Introduction to Cryptography with Maple影響因子(影響力)




書目名稱Introduction to Cryptography with Maple影響因子(影響力)學(xué)科排名




書目名稱Introduction to Cryptography with Maple網(wǎng)絡(luò)公開度




書目名稱Introduction to Cryptography with Maple網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Introduction to Cryptography with Maple被引頻次




書目名稱Introduction to Cryptography with Maple被引頻次學(xué)科排名




書目名稱Introduction to Cryptography with Maple年度引用




書目名稱Introduction to Cryptography with Maple年度引用學(xué)科排名




書目名稱Introduction to Cryptography with Maple讀者反饋




書目名稱Introduction to Cryptography with Maple讀者反饋學(xué)科排名




單選投票, 共有 0 人參與投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用戶組沒有投票權(quán)限
沙發(fā)
發(fā)表于 2025-3-21 23:37:11 | 只看該作者
板凳
發(fā)表于 2025-3-22 01:34:18 | 只看該作者
地板
發(fā)表于 2025-3-22 07:46:39 | 只看該作者
5#
發(fā)表于 2025-3-22 12:30:32 | 只看該作者
Message Authentication,th the use of encryption and decryption. But, important as confidentiality is, modern cryptography goes far beyond this objective and message authentication and message integrity are perhaps even more important goals. In this chapter we will look at techniques that provide message integrity in the p
6#
發(fā)表于 2025-3-22 13:23:34 | 只看該作者
Algorithmic Number Theory for Cryptography and Cryptanalysis: Primality, Factoring and Discrete Logy of the constructions and algorithms discussed. Also, computational number-theoretic problems which are presumed to be hard made their appearance and we mentioned, in particular, the integer factorization problem and the discrete logarithm problem. In the coming chapters we will study publickey cry
7#
發(fā)表于 2025-3-22 19:11:28 | 只看該作者
8#
發(fā)表于 2025-3-22 23:59:40 | 只看該作者
Public-Key Encryption,ion between two parties that do not have to share a common secret key. Public-key cryptography started with the realization that it should be possible to design encryption schemes in which it is computationally infeasible to find the decryption algorithm from the encryption one. This, in turn, entai
9#
發(fā)表于 2025-3-23 02:46:25 | 只看該作者
Digital Signatures,tance in fields like ecomerce and e-banking, where physical protection of exchanged data is impossible. A reasonable guarantee of data authenticity in the private-key setting can be obtained by using a MAC. However, the requirement that the parties share a secret key severely limits the applicabilit
10#
發(fā)表于 2025-3-23 08:08:11 | 只看該作者
Identity-Based Cryptography,it the wide deployment of public-key cryptography, in particular, the problem of binding public keys with user identities. The basic idea of IBC starts from the realization that there is some minimal information that a user has to learn before communicating with another party, even in unencrypted fo
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國際 ( 京公網(wǎng)安備110108008328) GMT+8, 2026-1-23 02:54
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
平谷区| 密云县| 会宁县| 萨嘎县| 延庆县| 嘉义市| 四子王旗| 肥城市| 三穗县| 南丹县| 湖口县| 阿荣旗| 介休市| 威远县| 西平县| 和平区| 磐安县| 湾仔区| 临颍县| 博湖县| 峡江县| 玉树县| 建阳市| 余庆县| 阿尔山市| 栖霞市| 同仁县| 庄河市| 洮南市| 金塔县| 青海省| 兰州市| 临江市| 潜江市| 茌平县| 梅河口市| 桃江县| 阿克苏市| 通渭县| 西乌| 运城市|