Joux, Antoine
Algorithmic cryptanalysis Antoine Joux - Boca Raton : CRC Press, c2009. - 501 p. : ill. ; 25 cm. - Chapman & Hall/CRC cryptography and network security .
A bird's-eye view of modern cryptography -- Elementary number theory and algebra background -- Linear algebra -- Sieve algorithms -- Brute force cryptanalysis -- The birthday paradox : sorting or not? -- Birthday-based algorithms for functions -- Birthday attacks through quadrisection -- Fourier and Hadamard-Walsh transforms -- Lattice reduction -- Polynomial systems and Gröbner base computations -- Attacks on stream ciphers -- Lattice-based cryptanalysis -- Elliptic curves and pairings -- Index calculus algorithms.
Illustrating the power of algorithms, Algorithmic Cryptanalysisdescribes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.
Algorithmic cryptanalysis Antoine Joux - Boca Raton : CRC Press, c2009. - 501 p. : ill. ; 25 cm. - Chapman & Hall/CRC cryptography and network security .
A bird's-eye view of modern cryptography -- Elementary number theory and algebra background -- Linear algebra -- Sieve algorithms -- Brute force cryptanalysis -- The birthday paradox : sorting or not? -- Birthday-based algorithms for functions -- Birthday attacks through quadrisection -- Fourier and Hadamard-Walsh transforms -- Lattice reduction -- Polynomial systems and Gröbner base computations -- Attacks on stream ciphers -- Lattice-based cryptanalysis -- Elliptic curves and pairings -- Index calculus algorithms.
Illustrating the power of algorithms, Algorithmic Cryptanalysisdescribes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.
Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applications. The final part addresses more sophisticated cryptographic applications, including LFSR-based stream ciphers and index calculus methods.
9781420070026
2009016989
Computer algorithms
Cryptography
005.8/2