Open access peer-reviewed chapter

Malicious Cryptology and Mathematics

By Eric Filiol

Submitted: May 4th 2011Reviewed: October 2nd 2011Published: March 7th 2012

DOI: 10.5772/34736

Downloaded: 2778

© 2012 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

How to cite and reference

Link to this chapter Copy to clipboard

Cite this chapter Copy to clipboard

Eric Filiol (March 7th 2012). Malicious Cryptology and Mathematics, Cryptography and Security in Computing Jaydip Sen, IntechOpen, DOI: 10.5772/34736. Available from:

Embed this chapter on your site Copy to clipboard

<iframe src="http://www.intechopen.com/embed/cryptography-and-security-in-computing/malicious-cryptology-and-mathematics" />

Embed this code snippet in the HTML of your website to show this chapter

chapter statistics

2778total chapter downloads

More statistics for editors and authors

Login to your personal dashboard for more detailed statistics on your publications.

Access personal reporting

Related Content

This Book

Next chapter

Cryptographic Criteria on Vector Boolean Functions

By José Antonio Álvarez-Cubero and Pedro J. Zufiria

Related Book

First chapter

Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks

By Jaydip Sen

We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.

+3,550 Open Access Books

+57,400 Citations in Web of Science

+108,500 IntechOpen Authors and Academic Editors

+560,000 Unique visitors per month

More about us