Table of Contents for
Public-key Cryptography: Theory and Practice

Version ebook / Retour

Cover image for bash Cookbook, 2nd Edition Public-key Cryptography: Theory and Practice by C. E. Veni Madhavan Published by Pearson India, 2009
  1. Copyright
  2. Preface
  3. Notations
  4. Overview
  5. Introduction
  6. Common Cryptographic Primitives
  7. Public-key Cryptography
  8. Some Cryptographic Terms
  9. Chapter Summary
  10. Mathematical Concepts
  11. Introduction
  12. Sets, Relations and Functions
  13. Groups
  14. Rings
  15. Integers
  16. Polynomials
  17. Vector Spaces and Modules
  18. Fields
  19. Finite Fields
  20. Affine and Projective Curves
  21. Elliptic Curves
  22. Hyperelliptic Curves
  23. Number Fields
  24. p-adic Numbers
  25. Statistical Methods
  26. Chapter Summary
  27. Suggestions for Further Reading
  28. Algebraic and Number-theoretic Computations
  29. Introduction
  30. Complexity Issues
  31. Multiple-precision Integer Arithmetic
  32. Elementary Number-theoretic Computations
  33. Arithmetic in Finite Fields
  34. Arithmetic on Elliptic Curves
  35. Arithmetic on Hyperelliptic Curves
  36. Random Numbers
  37. Chapter Summary
  38. Suggestions for Further Reading
  39. The Intractable Mathematical Problems
  40. Introduction
  41. The Problems at a Glance
  42. The Integer Factorization Problem
  43. The Finite Field Discrete Logarithm Problem
  44. The Elliptic Curve Discrete Logarithm Problem (ECDLP)
  45. The Hyperelliptic Curve Discrete Logarithm Problem
  46. Solving Large Sparse Linear Systems over Finite Rings
  47. The Subset Sum Problem
  48. Chapter Summary
  49. Suggestions for Further Reading
  50. Cryptographic Algorithms
  51. Introduction
  52. Secure Transmission of Messages
  53. Key Exchange
  54. Digital Signatures
  55. Entity Authentication
  56. Chapter Summary
  57. Suggestions for Further Reading
  58. Standards
  59. Introduction
  60. IEEE Standards
  61. RSA Standards
  62. Chapter Summary
  63. Suggestions for Further Reading
  64. Cryptanalysis in Practice
  65. Introduction
  66. Side-Channel Attacks
  67. Backdoor Attacks
  68. Chapter Summary
  69. Suggestions for Further Reading
  70. Quantum Computation and Cryptography
  71. Introduction
  72. Quantum Computation
  73. Quantum Cryptography
  74. Quantum Cryptanalysis
  75. Chapter Summary
  76. Suggestions for Further Reading
  77. Appendices
  78. Symmetric Techniques
  79. Introduction
  80. Block Ciphers
  81. Stream Ciphers
  82. Hash Functions
  83. Key Exchange in Sensor Networks
  84. Introduction
  85. Security Issues in a Sensor Network
  86. The Basic Bootstrapping Framework
  87. The Basic Random Key Predistribution Scheme
  88. Random Pairwise Scheme
  89. Polynomial-pool-based Key Predistribution
  90. Matrix-based Key Predistribution
  91. Location-aware Key Predistribution
  92. Complexity Theory and Cryptography
  93. Introduction
  94. Provably Difficult Computational Problems Are not Suitable
  95. One-way Functions and the Complexity Class UP
  96. Hints to Selected Exercises
  97. References
  98. Index