Open access peer-reviewed Edited Volume

Cryptography and Security in Computing

Edited by Jaydip Sen

Praxis Business School

The purpose of this book is to present some of the critical security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defence mechanisms. It contains eleven chapters which are divided into two parts. The chapters in Part 1 of the book mostly deal with theoretical and fundamental aspects of cryptography. The chapters in Part 2, on the other hand, discuss various applications of cryptographic protocols and techniques in designing computing and network security solutions. The book will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.

Read more >Order hardcopy
Cryptography and Security in ComputingEdited by Jaydip Sen

Published: March 7th 2012

DOI: 10.5772/2213

ISBN: 978-953-51-0179-6

eBook (PDF) ISBN: 978-953-51-5615-4

Copyright year: 2012

Books open for chapter submissions

40976 Total Chapter Downloads

8 Crossref Citations

9 Web of Science Citations

13 Dimensions Citations


Open access peer-reviewed

1. Provably Secure Cryptographic Constructions

By Sergey I. Nikolenko


Open access peer-reviewed

2. Malicious Cryptology and Mathematics

By Eric Filiol


Open access peer-reviewed

3. Cryptographic Criteria on Vector Boolean Functions

By José Antonio Álvarez-Cubero and Pedro J. Zufiria


Open access peer-reviewed

4. Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields

By Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez


Open access peer-reviewed

5. Elliptic Curve Cryptography and Point Counting Algorithms

By Hailiza Kamarulhaili and Liew Khang Jie


Open access peer-reviewed

6. Division and Inversion Over Finite Fields

By Abdulah Abdulah Zadeh


Open access peer-reviewed

7. Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks

By Jaydip Sen


Open access peer-reviewed

8. Scan-Based Side-Channel Attack on the RSA Cryptosystem

By Ryuta Nara, Masao Yanagisawa and Nozomu Togawa


Open access peer-reviewed

9. PGP Protocol and Its Applications

By Hilal M. Yousif Al-Bayatti, Abdul Monem S. Rahma and Hala Bhjat Abdul Wahab


Open access peer-reviewed

10. Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

By Saman Shojae Chaeikar, Azizah Bt Abdul Manaf and Mazdak Zamani


Open access peer-reviewed

11. Potential Applications of IPsec in Next Generation Networks

By Cristina-Elena Vintilă


Edited Volume and chapters are indexed in

  • Worldcat
  • OpenAIRE
  • Google Scholar
  • AZ ebsco
  • Base
  • CNKI

Order a hardcopy of the Edited Volume

Free shipping with DHL Express

Hardcover (ex. VAT)£119

Order now

Residents of European Union countries need to add a Book Value-Added Tax Rate based on their country of residence. Institutions and companies, registered as VAT taxable entities in their own EU member state, will not pay VAT by providing IntechOpen with their VAT registration number. This is made possible by the EU reverse charge method.

Special discount for IntechOpen contributors

All IntechOpen contributors are offered special discounts starting at 40% OFF available through your personal dashboard

Login and purchase