Amazon cover image
Image from Amazon.com

Probabilistic and statistical methods in cryptology : an introduction by selected topics / Daniel Neuenschwander.

By: Neuenschwander, Daniel, 1963-Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 3028. | Lecture notes in computer science. Tutorial.Publication details: Berlin ; New York : Springer, ©2004. Description: 1 online resource (x, 158 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 3540259422; 9783540259428; 1280307560; 9781280307560Subject(s): Coding theory | Cryptography -- Statistical methods | Cryptography -- Computer simulation | Cryptography -- Mathematics | Ciphers | Codage | Cryptographie -- Méthodes statistiques | Cryptographie -- Simulation par ordinateur | Cryptographie -- Mathématiques | Chiffres (Cryptographie) | COMPUTERS -- Information Theory | Ciphers | Coding theory | Cryptography -- Mathematics | Zufallsgenerator | Pseudozufallszahlen | Kryptologie | Stochastik | Kryptosystem | Cryptographie (Informatique) | Méthode statistique | Simulation par ordinateur | Générateur de nombres aléatoires | Chiffre (Cryptographie)Genre/Form: Electronic books. Additional physical formats: Print version:: Probabilistic and statistical methods in cryptology.DDC classification: 003/.54 LOC classification: QA268 | .N48 2004ebOther classification: 54.62 | 54.10 | SK 170 | SS 4800 | DAT 465f Online resources: Click here to access online
Contents:
1 Classical Polyalphabetic Substitution Ciphers -- 2 RSA and Probabilistic Prime Number Tests -- 3 Factorization with Quantum Computers: Shor's Algorithm -- 4 Physical Random-Number Generators -- 5 Pseudo-random Number Generators -- 6 An Information Theory Primer -- 7 Tests for (Pseudo- )Random Number Generators -- 8 Diffie-Hellman Key Exchange -- 9 Differential Cryptanalysis -- 10 Semantic Security -- 11 *Algorithmic Complexity -- 12 Birthday Paradox and Meet-in-the-Middle Attack -- 13 Quantum Cryptography.
Summary: Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of stochastic aspects of cryptology. Besides classical topics from cryptology, the author presents chapters on probabilistic prime number tests, factorization with quantum computers, random-number generators, pseudo-random-number generators, information theory, and the birthday paradox and meet-in-the-middle attack. In the light of the vast literature on stochastic results relevant for cryptology, this book is intended as an invitation and introduction for students, researchers, and practitioners to probabilistic and statistical issues in cryptology.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references (pages 152-155) and index.

Print version record.

Cryptology nowadays is one of the most important areas of applied mathematics, building on deep results and methods from various areas of mathematics. This text is devoted to the study of stochastic aspects of cryptology. Besides classical topics from cryptology, the author presents chapters on probabilistic prime number tests, factorization with quantum computers, random-number generators, pseudo-random-number generators, information theory, and the birthday paradox and meet-in-the-middle attack. In the light of the vast literature on stochastic results relevant for cryptology, this book is intended as an invitation and introduction for students, researchers, and practitioners to probabilistic and statistical issues in cryptology.

1 Classical Polyalphabetic Substitution Ciphers -- 2 RSA and Probabilistic Prime Number Tests -- 3 Factorization with Quantum Computers: Shor's Algorithm -- 4 Physical Random-Number Generators -- 5 Pseudo-random Number Generators -- 6 An Information Theory Primer -- 7 Tests for (Pseudo- )Random Number Generators -- 8 Diffie-Hellman Key Exchange -- 9 Differential Cryptanalysis -- 10 Semantic Security -- 11 *Algorithmic Complexity -- 12 Birthday Paradox and Meet-in-the-Middle Attack -- 13 Quantum Cryptography.

Powered by Koha