Condizione: New.
Condizione: As New. Unread book in perfect condition.
EUR 51,68
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
Condizione: New.
Condizione: New.
EUR 57,98
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New.
EUR 61,21
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 59,28
Quantità: 3 disponibili
Aggiungi al carrellopaperback. Condizione: New.
Editore: Springer International Publishing AG, CH, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Lingua: Inglese
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 78,31
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. 2023 ed. This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.
Condizione: As New. Unread book in perfect condition.
EUR 64,87
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 70,96
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 215 pages. 9.25x6.10x9.25 inches. In Stock.
EUR 86,74
Quantità: 1 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 81,15
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 84,64
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Editore: Springer-Nature New York Inc, 2023
ISBN 10: 3031329589 ISBN 13: 9783031329586
Lingua: Inglese
Da: Revaluation Books, Exeter, Regno Unito
EUR 99,52
Quantità: 2 disponibili
Aggiungi al carrelloHardcover. Condizione: Brand New. 215 pages. 9.00x6.00x0.75 inches. In Stock.
EUR 102,16
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 67,49
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New.
Editore: Springer, Berlin|Springer Nature Switzerland|Springer, 2023
ISBN 10: 3031329589 ISBN 13: 9783031329586
Lingua: Inglese
Da: moluna, Greven, Germania
EUR 81,44
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: Springer International Publishing AG, CH, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Lingua: Inglese
Da: Rarewaves.com UK, London, Regno Unito
EUR 72,22
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: New. 2023 ed. This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.
Da: Majestic Books, Hounslow, Regno Unito
EUR 133,97
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 135,41
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND.