The first thing you will find out about this book is that it is fun to read. It is meant for the browser, as well as for the student and for the specialist wanting to know about the area. The footnotes give an historical background to the text, in addition to providing deeper applications of the concept that is being cited. This allows the browser to look more deeply into the history or to pursue a given sideline. Those who are only marginally interested in the area will be able to read the text, pick up information easily, and be entertained at the same time by the historical and...
The first thing you will find out about this book is that it is fun to read. It is meant for the browser, as well as for the student and for the speci...
Although a vast literature exists on the subject of RSA and public-key cryptography, there is no single source that reveals recent developments in the area. This book provides a rigorous and detailed treatment of public-key cryptography (PKC), from RSA, the first public key system devised in 1978, to the latest applications of PKC, including electronic cash, secret broadcasting, secret balloting systems, various banking and payment protocols, high security logins, smart cards, and biometrics. Accessible to anyone from the senior undergraduate to the research scientist, RSA and Public-Key...
Although a vast literature exists on the subject of RSA and public-key cryptography, there is no single source that reveals recent developments in the...