Reference Hub1
Indices1
Algorithmic Strategies for Solving Complex Problems in Cryptography

Algorithmic Strategies for Solving Complex Problems in Cryptography

Copyright: © 2018 |Pages: 302
ISBN13: 9781522529156|ISBN10: 1522529152|EISBN13: 9781522529163
DOI: 10.4018/978-1-5225-2915-6
Cite Book Cite Book

MLA

Balasubramanian, Kannan, and M. Rajakani, editors. Algorithmic Strategies for Solving Complex Problems in Cryptography. IGI Global, 2018. https://doi.org/10.4018/978-1-5225-2915-6

APA

Balasubramanian, K. & Rajakani, M. (Eds.). (2018). Algorithmic Strategies for Solving Complex Problems in Cryptography. IGI Global. https://doi.org/10.4018/978-1-5225-2915-6

Chicago

Balasubramanian, Kannan, and M. Rajakani, eds. Algorithmic Strategies for Solving Complex Problems in Cryptography. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-2915-6

Export Reference

Mendeley
Favorite Full-Book Download

Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field.

Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. Featuring relevant topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring, this publication is ideal for academicians, graduate students, engineers, professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Back Materials
Related References
This content has been removed at the discretion of the publisher and the editors.
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.