| 000 | 02704nam a22004935i 4500 | ||
|---|---|---|---|
| 001 | 978-0-387-48742-7 | ||
| 003 | DE-He213 | ||
| 005 | 20250710084002.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2008 xxu| s |||| 0|eng d | ||
| 020 |
_a9780387487427 _a99780387487427 |
||
| 024 | 7 |
_a10.1007/978-0-387-48742-7 _2doi |
|
| 082 | 0 | 4 |
_a005.82 _223 |
| 100 | 1 |
_aYan, Song Y. _eauthor. |
|
| 245 | 1 | 0 |
_aCryptanalytic Attacks on RSA _h[recurso electrónico] / _cby Song Y. Yan. |
| 264 | 1 |
_aBoston, MA : _bSpringer US, _c2008. |
|
| 300 | _bonline resource. | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_arecurso en línea _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 505 | 0 | _aComputational/Mathematical Preliminaries -- RSA Public-Key Cryptography -- Integer Factorization Attacks -- Discrete Logarithm Attacks -- Quantum Computing Attacks -- Simple Elementary Attacks -- Public Exponent Attacks -- Private Exponent Attacks -- Side-Channel Attacks -- The Road Ahead. | |
| 520 | _aRSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first. This is followed by an account of the RSA cryptographic system and its variants. Cryptanalytic Attacks on RSA is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a reference or secondary text book for advanced level students in computer science. | ||
| 650 | 0 | _aCOMPUTER SCIENCE. | |
| 650 | 0 | _aCOMPUTER COMMUNICATION NETWORKS. | |
| 650 | 0 | _aDATA PROTECTION. | |
| 650 | 0 | _aDATA STRUCTURES (COMPUTER SCIENCE). | |
| 650 | 0 | _aDATA ENCRYPTION (COMPUTER SCIENCE). | |
| 650 | 0 | _aCODING THEORY. | |
| 650 | 1 | 4 | _aCOMPUTER SCIENCE. |
| 650 | 2 | 4 | _aDATA ENCRYPTION. |
| 650 | 2 | 4 | _aDATA STRUCTURES, CRYPTOLOGY AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aSYSTEMS AND DATA SECURITY. |
| 650 | 2 | 4 | _aCODING AND INFORMATION THEORY. |
| 650 | 2 | 4 | _aDATA STRUCTURES. |
| 650 | 2 | 4 | _aCOMPUTER COMMUNICATION NETWORKS. |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrinted edition: _z9780387487410 |
| 856 | 4 | 0 |
_uhttp://dx.doi.org/10.1007/978-0-387-48742-7 _zVer el texto completo en las instalaciones del CICY |
| 912 | _aZDB-2-SCS | ||
| 942 |
_2ddc _cER |
||
| 999 |
_c57788 _d57788 |
||