2009 | OriginalPaper | Chapter
Applications to Cryptography
Authors : Michael J. Jacobson Jr., Hugh C. Williams
Published in: Solving the Pell Equation
Publisher: Springer New York
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
We now live in a world where the security and integrity of our information and communications is not guaranteed, where the number and sophistication of attacks on these systems are increasing rapidly, and where the impact of those attacks can be measured in billions of dollars and in the loss of reputation and personal integrity. Thus, it is essential today, more than ever, to develop techniques that will protect our communications. One essential component of any installation in which secure communication is needed is cryptography. Its use goes back to Julius Caesar, or perhaps even earlier.
1