Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.Divided into three parts, the book begins with a

part |2 pages

Part I. Background

part |2 pages

Part II. Algorithms

chapter 3|52 pages

Linear algebra

chapter 4|32 pages

Sieve algorithms

chapter 5|30 pages

Brute force cryptanalysis

chapter 6|38 pages

The birthday paradox: Sorting or not?

chapter 7|28 pages

Birthday-based algorithms for functions

chapter 8|22 pages

Birthday attacks through quadrisection

chapter 9|36 pages

Fourier and Hadamard-Walsh transforms

chapter 10|28 pages

Lattice reduction

part |2 pages

Part III. Applications

chapter 12|24 pages

Attacks on stream ciphers

chapter 13|20 pages

Lattice-based cryptanalysis

chapter 14|22 pages

Elliptic curves and pairings

chapter 15|32 pages

Index calculus algorithms

chapter |20 pages


chapter |6 pages