Team for Research in
Ubiquitous Secure Technology

Applied Cryptanalysis: Breaking Ciphers in the Real World
Mark Stamp, Richard M. Low

Citation
Mark Stamp, Richard M. Low. "Applied Cryptanalysis: Breaking Ciphers in the Real World". Wiley-Interscience, 2007, 978-0470114865.

Abstract
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material in the text. This would be particularly valuable to working professionals who might want to use the book as a way to quickly gain some depth on one specific topic.

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Mark Stamp, Richard M. Low. <a
    href="http://www.truststc.org/pubs/200.html"
    ><i>Applied Cryptanalysis: Breaking Ciphers in the
    Real World</i></a>, Wiley-Interscience, 2007,
    978-0470114865.
  • Plain text
    Mark Stamp, Richard M. Low. "Applied Cryptanalysis:
    Breaking Ciphers in the Real World".
    Wiley-Interscience, 2007, 978-0470114865.
  • BibTeX
    @book{StampLow07_AppliedCryptanalysisBreakingCiphersInRealWorld,
        author = {Mark Stamp and Richard M. Low},
        title = {Applied Cryptanalysis: Breaking Ciphers in the
                  Real World},
        publisher = {Wiley-Interscience},
        year = {2007},
        isbn = {978-0470114865},
        abstract = {The book is designed to be accessible to motivated
                  IT professionals who want to learn more about the
                  specific attacks covered. In particular, every
                  effort has been made to keep the chapters
                  independent, so if someone is interested in has
                  function cryptanalysis or RSA timing attacks, they
                  do not necessarily need to study all of the
                  previous material in the text. This would be
                  particularly valuable to working professionals who
                  might want to use the book as a way to quickly
                  gain some depth on one specific topic.},
        URL = {http://www.truststc.org/pubs/200.html}
    }
    

Posted by Mary Margaret Sprinkle on 12 Mar 2007.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.