You are not signed in. Sign in.

Share:

Category IT Books

Algorithmic Cryptanalysis »

Book cover image of Algorithmic Cryptanalysis by Antoine Joux

Authors: Antoine Joux
ISBN-13: 9781420070026, ISBN-10: 1420070029
Format: Hardcover
Publisher: Taylor & Francis, Inc.
Date Published: June 2009
Edition: (Non-applicable)

Find Best Prices for This Book »

Author Biography: Antoine Joux

Antoine Joux is associate professor at Université de Versailles Saint-Quentin-en-Yvelines.

Book Synopsis

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.

Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applications. The final part addresses more sophisticated cryptographic applications, including LFSR-based stream ciphers and index calculus methods.

Accounting for the impact of current computer architectures, this book explores the algorithmic and implementation aspects of cryptanalysis methods. It can serve as a handbook of algorithmic methods for cryptographers as well as a textbook for undergraduate and graduate courses on cryptanalysis and cryptography.

Table of Contents

I Background

1 A bird's-eye view of modern cryptography 3

2 Elementary number theory and algebra background 23

II Algorithms

3 Linear algebra 71

4 Sieve algorithms 123

5 Brute force cryptanalysis 155

6 The birthday paradox: Sorting or not? 185

7 Birthday-based algorithms for functions 223

8 Birthday attacks through quadrisection 251

9 Fourier and Hadamard-Walsh transforms 273

10 Lattice reduction 309

11 Polynomial systems and Grabner base computations 337

III Applications

12 Attacks on stream ciphers 373

13 Lattice-based cryptanalysis 397

14 Elliptic curves and pairings 417

15 Index calculus algorithms 439

References 471

Lists 491

Index 497

Subjects


 

 




No reviews. Submit yours!



Review this book.

We would like to know what you think about this book and publish your thoughts here! (top)

Your Review

  1. You may optionally give a title for this comment.

  2. Worst to best, 1 to 5, what would you rate this one?

  3. The actual content of your comment. No HTML nor whatsoever allowed.

  4. The author of this comment.

  5. Is a girl female or male?

    Please answer the question by common sense.