Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Algorithmic Cryptanalysis, Hardback Book

Hardback

Description

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples.

Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program. Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra.

It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applications.

The final part addresses more sophisticated cryptographic applications, including LFSR-based stream ciphers and index calculus methods. Accounting for the impact of current computer architectures, this book explores the algorithmic and implementation aspects of cryptanalysis methods.

It can serve as a handbook of algorithmic methods for cryptographers as well as a textbook for undergraduate and graduate courses on cryptanalysis and cryptography.

Information

  • Format:Hardback
  • Pages:520 pages, 22 Tables, black and white; 22 Illustrations, black and white
  • Publisher:Taylor & Francis Ltd
  • Publication Date:
  • Category:
  • ISBN:9781420070026

£130.00

 
Free Home Delivery

on all orders

 
Pick up orders

from local bookshops

Information

  • Format:Hardback
  • Pages:520 pages, 22 Tables, black and white; 22 Illustrations, black and white
  • Publisher:Taylor & Francis Ltd
  • Publication Date:
  • Category:
  • ISBN:9781420070026

Also in the Chapman & Hall/CRC Cryptography and Network Security Series series  |  View all