The first thing you will find out about this book is that it is fun to read. It is meant for the browser, as well as for the student and for the specialist wanting to know about the area. The footnotes give an historical background to the text, in addition to providing deeper applications of the concept that is being cited. This allows the browser to look more deeply into the history or to pursue a given sideline. Those who are only marginally interested in the area will be able to read the text, pick up information easily, and be entertained at the same time by the historical and...
The first thing you will find out about this book is that it is fun to read. It is meant for the browser, as well as for the student and for the speci...
Although a vast literature exists on the subject of RSA and public-key cryptography, there is no single source that reveals recent developments in the area. This book provides a rigorous and detailed treatment of public-key cryptography (PKC), from RSA, the first public key system devised in 1978, to the latest applications of PKC, including electronic cash, secret broadcasting, secret balloting systems, various banking and payment protocols, high security logins, smart cards, and biometrics. Accessible to anyone from the senior undergraduate to the research scientist, RSA and Public-Key...
Although a vast literature exists on the subject of RSA and public-key cryptography, there is no single source that reveals recent developments in the...
The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is associated with a particular conference, symposium or workshop. These events cover various topics within pure and applied mathematics and provide up-to-date coverage of new developments, methods and applications.
The series is aimed specifically at publishing peer reviewed reviews and contributions presented at workshops and conferences. Each volume is assoc...