| RSA is the first workable and practicable public-key cryptographic system, based on the use of large prime numbers. It is also the most popular and widely-used cryptographic system in today's digital world, for which its three inventors Rivest, Shamir and Adleman received the year 2002 Turing Award, the equivalent Nobel Prize in Computer Science.
Cryptanalytic Attacks on RSA covers almost all major known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. Since RSA depends heavily on computational complexity theory and number theory, background information on complexity theory and number theory is presented first. This is followed by an account of the RSA cryptographic system and its variants.
Cryptanalytic Attacks on RSA is designed for a professional audience of practitioners and researchers in industry and academia and as a reference or secondary text for advanced level students in computer science, applied mathematics, electrical & communication engineering.
|
|
|
Enterprise Java with UML
This work is a comprehensive guide to using UML (Unified Modelling Language) in model Java applications. The book presents strategies for developing enterprise systems using Java and related technologies - XML, Servlets, Enterprise JavaBeans, Swing Components, CORBA, RMI, and others. The authors explain how UML is used as a modelling tool for... | | Herb Schildt's C++ Programming Cookbook
Your Ultimate "How-To" Guide to C++ Programming!
Legendary programming author Herb Schildt shares some of his favorite programming techniques in this high-powered C++ "cookbook." Organized for quick reference, each "recipe" shows how to accomplish a practical programming task. A recipe... | | Deploying Microsoft Forefront Protection 2010 for Exchange Server
When we began this project, our intent was to create a real-world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Protection for Exchange Server (FPE) 2010. We hope you find that we have achieved that goal. We’ve also included a thorough explanation of the architectural... |
|