68,30 €
75,89 €
-10% with code: EXTRA
NTRU Cryptography
NTRU Cryptography
68,30
75,89 €
  • We will send in 10–14 business days.
The book gives a detailed introduction to the NTRU cryptosystem and its attacks. First we give some mathematical background, where we consider the ring on which NTRU is based on and we introduce some important properties of this ring. Then we introduce the cryptosystem, where we see two possible ways to decrypt. Followed by this we do a security analysis, where we introduce the most important attacks against NTRU. The most interesting attacks are the lattice attacks, where we spend a whole chap…
75.89
  • Publisher:
  • Year: 2013
  • Pages: 92
  • ISBN-10: 3639496086
  • ISBN-13: 9783639496086
  • Format: 15.2 x 22.9 x 0.6 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

NTRU Cryptography (e-book) (used book) | Kevin Brand | bookbook.eu

Reviews

(3.00 Goodreads rating)

Description

The book gives a detailed introduction to the NTRU cryptosystem and its attacks. First we give some mathematical background, where we consider the ring on which NTRU is based on and we introduce some important properties of this ring. Then we introduce the cryptosystem, where we see two possible ways to decrypt. Followed by this we do a security analysis, where we introduce the most important attacks against NTRU. The most interesting attacks are the lattice attacks, where we spend a whole chapter to these sorts of attacks.

EXTRA 10 % discount with code: EXTRA

68,30
75,89 €
We will send in 10–14 business days.

The promotion ends in 21d.08:49:28

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,76 Book Euros!?
  • Author: Kevin Brand
  • Publisher:
  • Year: 2013
  • Pages: 92
  • ISBN-10: 3639496086
  • ISBN-13: 9783639496086
  • Format: 15.2 x 22.9 x 0.6 cm, minkšti viršeliai
  • Language: English English

The book gives a detailed introduction to the NTRU cryptosystem and its attacks. First we give some mathematical background, where we consider the ring on which NTRU is based on and we introduce some important properties of this ring. Then we introduce the cryptosystem, where we see two possible ways to decrypt. Followed by this we do a security analysis, where we introduce the most important attacks against NTRU. The most interesting attacks are the lattice attacks, where we spend a whole chapter to these sorts of attacks.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)