This professional book covers almost all known cryptanalytic attacks and defenses of the RSA cryptographic system and its variants. It presents useful guidelines for proper use of RSA in information security and is the first book to cover its subject exclusively.
The revised, expanded 3rd edition of this classic cryptology reference offers a wealth of new technical and biographical material. Requiring minimal math, and spiced with amusing and sometimes personal accounts from the history of cryptology, it will interest a broad readership.
This is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. The book provides the reader with a better understanding of the security guarantees provided by digital signatures.
This book is the first comprehensive overview of contemporary systems for secure electronic/digital postage. It introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The world’s industrial-scale electronic postage systems are sorted out with respect to this taxonomy.
This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.