30,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

Serious Cryptography is the much anticipated review of modern cryptography by cryptographer JP Aumasson. This is a book for readers who want to understand how cryptography works in today´s world. The book is suitable for a wide audience, yet is filled with mathematical concepts and meaty discussions of how the various cryptographic mechanisms work. Chapters cover the notion of secure encryption, randomness, block ciphers and ciphers, hash functions and message authentication codes, public-key crypto including RSA, Diffie-Hellman, and elliptic curves, as well as TLS and post-quantum cryptography. Numerous code examples and real use cases throughout will help practitioners to understand the core concepts behind modern cryptography, as well as how to choose the best algorithm or protocol and ask the right questions of vendors. Aumasson discusses core concepts like computational security and forward secrecy, as well as strengths and limitations of cryptographic functionalities related to

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

40,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

The purpose of this book is to introduce the reader to arithmetic topics, both ancient and modern, which have been at the center of interest in applications of number theory, particularly in cryptography. No background in algebra or number theory is assumed, and the book begins with a discussion of the basic number theory which is needed. The approach taken is algorithmic, emphasizing estimates of the efficiency of the techniques which arise from the theory. A special feature is the inclusion of recent application of the theory of elliptic curves. Extensive imaginative exercises and careful, revealing answers have been included in all of the chapters. The information society and the computer age have given rise to innumerable applications for cryptography besides the original motivation of secure communication. Thus, cryptography is a relatively fast-moving field. The new edition contains due to that fact substantial revisions and updated references.

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

139,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

66,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 numbered definitions, facts, examples, notes, and remarks; and over 1,250 significant references, including brief comments on each paper.

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

16,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

The Manga Guide to Cryptography breaks down how ciphers work, what makes them secure or insecure, and how to decode them. Comic illustrations make it easy to learn about classic substitution, polyalphabetic, and transposition ciphers; symmetric-key algorithms like block and DES (Data Encryption Standard) ciphers; how to use public key encryption technology to generate public/private keys and cryptograms; practical applications of encryption such as digital signatures, identity fraud countermeasures, and ´man in the middle´ attack countermeasures.

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

108,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures. Readers receive the theoretical fundamentals as an underpinning for a wealth of practical and accessible knowledge about efficient application. Features & Benefits: Breadth of coverage and unified, integrated approach to elliptic curve cryptosystems Describes important industry and government protocols, such as the FIPS 186-2 standard from the U.S. National Institute for Standards and Technology Provides full exposition on techniques for efficiently implementing finite-field and elliptic curve arithmetic Distills complex mathematics and algorithms for easy understanding Includes useful literature references, a list of algorithms, and appendices on sample parameters, ECC standards, and software tools This comprehensive, highly focused reference is a useful and indispensable resource for practitioners, professionals, or researchers in computer science, computer engineering, network design, and network data security.

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

52,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Anbieter: buecher.de

Stand: 24.05.2019 Zum Angebot

Stand: 24.05.2019 Zum Angebot

55,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. This text provides an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: classical cryptographic constructions, such as Diffie - Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; an in-depth treatment of important cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. The second edition of An Introduction to Mathematical Cryptography includes a significant revision of the material on digital signatures, including an earlier introduction to RSA, Elgamal, and DSA signatures, and new material on lattice-based signatures and rejection sampling. Many sections have been rewritten or expanded for clarity, especially in the chapters on information theory, elliptic curves, and lattices, and the chapter of additional topics has been expanded to include sections on digital cash and homomorphic encryption. Numerous new exercises have been included.

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot

26,99 € *

ggf. zzgl. Versand

ggf. zzgl. Versand

Shows developers how to use the decentralization and trustless common knowledge structures of blockchain cryptography to build decentralized applications.

Anbieter: buecher.de

Stand: 23.05.2019 Zum Angebot

Stand: 23.05.2019 Zum Angebot