Cryptography : algorithms, protocols, and standards for computer security / Zoubir Z Mammeri.
Material type:
TextPublisher: Hoboken, New Jersey : John Wiley & Sons, Inc., 2024Description: xxii, 592 pages : illustrations ; 28 cmContent type: - text
- unmediated
- volume
- 9781394207480
- 005.824 M311c 23/eng/20230807
- QA268 .M34 2024
| Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main Library | Circulation Section | CIR 005.824 M311c 2024 (Browse shelf(Opens below)) | 1-1 | Available | 031362 |
Browsing Main Library shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| CIR 005.824 Al261c 2022 Cryptography and network security / | CIR 005.824 As99 2022 Asymmetric cryptography : primitives and protocols / | CIR 005.824 G862c 2020 Cryptography apocalypse : preparing for the day when quantum computing breaks today's crypto / | CIR 005.824 M311c 2024 Cryptography : algorithms, protocols, and standards for computer security / | CIR 005.824 P846b 2022 Blockchain security from the bottom up : securing and preventing attacks on cryptocurrencies, decentralized applications, NFTs, and smart contracts / | CIR 005.83 Io8 2020 IoT security : advances in authentication / | CIR 006.22 L499a 2021 Architecting high-performance embedded systems : design and build high-performance real-time digital systems based on FPGAs and custom circuits / |
Includes bibliographical references and index.
Introduction to computer security -- Introduction to cryptography -- Mathematical basics and computation algorithms for cryptography -- Symmetric ciphering: historical ciphers -- Hash functions, message authentication codes, and digital signature -- Stream ciphers -- Block ciphers: basics, TDEA, and AES -- Block cipher modes of operation for confidentiality -- Block cipher modes of operation for authentication and confidentiality -- Introduction to security analysis of blocks ciphers -- Introduction to cryptanalysis attacks on symmetric ciphers -- Public-key cryptosystems: RSA and finite field cryptography based schemes -- Public-key cryptosystems: elliptic curve cryptography -- Key management -- Digital certificate, public-key infrastructure, TLS, and Kerberos -- Generation of pseudorandom and prime numbers for cryptographic -- applications.
"Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before.
This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come"-- Amazon.com.
There are no comments on this title.