
- 128 pages
- English
- PDF
- Available on iOS & Android
About this book
Cyber security is taking on an important role in information systems and data transmission over public networks. This is due to the widespread use of the Internet for business and social purposes. This increase in use encourages data capturing for malicious purposes. To counteract this, many solutions have been proposed and introduced during the past 80 years, but Cryptography is the most effective tool. Some other tools incorporate complicated and long arithmetic calculations, vast resources consumption, and long execution time, resulting in it becoming less effective in handling high data volumes, large bandwidth, and fast transmission. Adding to it the availability of quantum computing, cryptography seems to lose its importance. To restate the effectiveness of cryptography, researchers have proposed improvements. This book discusses and examines several such improvements and solutions.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Modern Cryptography – Current Challenges and Solutions
- Contents
- Preface
- Chapter1 Implementing Symmetric Cryptography Using Sequence of Semi-Bent Functions
- Chapter2 Survey of RSA Vulnerabilities
- Chapter3 A Survey of Fast Scalar Multiplication on Elliptic Curve Cryptography for Lightweight Embedded Devices
- Chapter4 Numerical Problem Encryption for High-Performance Computing Applications
- Chapter5 Overlay Security: Quantum-Safe Communication over the Internet Infrastructure
- Chapter6 The MOR Cryptosystem in Classical Groups with a Gaussian Elimination Algorithm for Symplectic and Orthogonal Groups