Applications to Cryptography

Part of the CMS Books in Mathematics book series (CMSBM)

We now live in a world where the security and integrity of our information and communications is not guaranteed, where the number and sophistication of attacks on these systems are increasing rapidly, and where the impact of those attacks can be measured in billions of dollars and in the loss of reputation and personal integrity. Thus, it is essential today, more than ever, to develop techniques that will protect our communications. One essential component of any installation in which secure communication is needed is cryptography. Its use goes back to Julius Caesar, or perhaps even earlier.1


Class Group Discrete Logarithm Cryptographic Protocol Discrete Logarithm Problem Random Oracle Model 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2009

Personalised recommendations