Suche einschränken:
Zur Kasse

15 Ergebnisse.

Quantum Computational Number Theory

Yan, Song Y.
Quantum Computational Number Theory
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic,...

CHF 158.00

Cybercryptography: Applicable Cryptography for Cyberspace...

Yan, Song Y.
Cybercryptography: Applicable Cryptography for Cyberspace Security
This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cr...

CHF 157.00

Computational Number Theory and Modern Cryptography

Yan, Song Y.
Computational Number Theory and Modern Cryptography
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an i...

CHF 120.00

Primality Testing and Integer Factorization in Public-Key...

Yan, Song Y.
Primality Testing and Integer Factorization in Public-Key Cryptography
Although the Primality Testing Problem (PTP) has been proved to be solvable in deterministic polynomial-time (P) in 2002 by Agrawal, Kayal and Saxena, the Integer Factorization Problem (IFP) still remains unsolvable in P. The security of many practical Public-Key Cryptosystems and Protocols such as RSA (invented by Rivest, Shamir and Adleman) relies on the computational intractability of IFP. This monograph provides a survey of recent progress...

CHF 203.00

Number Theory for Computing

Yan, Song Y.
Number Theory for Computing
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists use computers in factoring large integers, determining primes, testing conjectures, and solving ot...

CHF 78.00

Cryptanalytic Attacks on RSA

Yan, Song Y.
Cryptanalytic Attacks on RSA
RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is present...

CHF 142.00

Primality Testing and Integer Factorization in Public-Key...

Yan, Song Y.
Primality Testing and Integer Factorization in Public-Key Cryptography
Primality Testing and Integer Factorization in Public-Key Cryptography introduces various algorithms for primality testing and integer factorization, with their applications in public-key cryptography and information security. More specifically, this book explores basic concepts and results in number theory in Chapter 1. Chapter 2 discusses various algorithms for primality testing and prime number generation, with an emphasis on the Miller-Rab...

CHF 157.00

Perfect, Amicable and Sociable Numbers: A Computational A...

Yan, Song Y
Perfect, Amicable and Sociable Numbers: A Computational Approach
This volume is about perfect, amicable and social numbers, with an emphasis on amicable numbers, from mathematical and a computational viewpoints. It introduces the basic concepts and results of perfect, amicable and sociable numbers and reviews the history of the search for these numbers.

CHF 129.00

Quantum Attacks on Public-Key Cryptosystems

Yan, Song Y.
Quantum Attacks on Public-Key Cryptosystems
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP a...

CHF 147.00

Cryptanalytic Attacks on RSA

Yan, Song Y.
Cryptanalytic Attacks on RSA
RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital world. Cryptanalytic Attacks on RSA, a professional book, covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is present...

CHF 142.00

Quantum Computational Number Theory

Yan, Song Y.
Quantum Computational Number Theory
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation, primality testing, integer factorization, discrete logarithms, elliptic curve arithmetic,...

CHF 134.00

Number Theory for Computing

Yan, Song Y. / Hellmann, M.E.
Number Theory for Computing
There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists use computers in factoring large integers, determining primes, testing conjectures, and solving ot...

CHF 97.00

An Introduction to Formal Languages and Machine Computation

Yan, Song Y
An Introduction to Formal Languages and Machine Computation
This book provides a concise and modern introduction to Formal Languages and Machine Computation, a group of disparate topics in the theory of computation, which includes formal languages, automata theory, turing machines, computability, complexity, number-theoretic computation, public-key cryptography, and some new models of computation, such as quantum and biological computation. As the theory of computation is a subject based on mathematics...

CHF 86.00

Primality Testing and Integer Factorization in Public-Key...

Yan, Song Y.
Primality Testing and Integer Factorization in Public-Key Cryptography
Although the Primality Testing Problem (PTP) has been proved to be solvable in deterministic polynomial-time (P) in 2002 by Agrawal, Kayal and Saxena, the Integer Factorization Problem (IFP) still remains unsolvable in P. The security of many practical Public-Key Cryptosystems and Protocols such as RSA (invented by Rivest, Shamir and Adleman) relies on the computational intractability of IFP. This monograph provides a survey of recent progress...

CHF 188.00

Quantum Attacks on Public-Key Cryptosystems

Yan, Song Y.
Quantum Attacks on Public-Key Cryptosystems
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no polynomial-time algorithms exist for them so far. However, polynomial-time quantum algorithms for IFP, DLP a...

CHF 134.00