| 000 | 03137cam a22003858i 4500 | ||
|---|---|---|---|
| 001 | 23243979 | ||
| 003 | CSPC | ||
| 005 | 20260312115356.0 | ||
| 008 | 230725s2024 nju b 001 0 eng c | ||
| 010 | _a 2023030470 | ||
| 020 | _a9781394207480 | ||
| 035 | _a23243979 | ||
| 040 |
_aMdU/DLC _beng _erda _cDLC _dDLC _dCSPC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA268 _b.M34 2024 |
| 082 | 0 | 0 |
_a005.824 _bM311c _223/eng/20230807 |
| 100 | 1 |
_aMammeri, Zoubir, _eauthor. |
|
| 245 | 1 | 0 |
_aCryptography : _balgorithms, protocols, and standards for computer security / _cZoubir Z Mammeri. |
| 263 | _a2401 | ||
| 264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, Inc., _c2024. |
|
| 300 |
_axxii, 592 pages : _billustrations ; _c28 cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction to computer security -- Introduction to cryptography -- Mathematical basics and computation algorithms for cryptography -- Symmetric ciphering: historical ciphers -- Hash functions, message authentication codes, and digital signature -- Stream ciphers -- Block ciphers: basics, TDEA, and AES -- Block cipher modes of operation for confidentiality -- Block cipher modes of operation for authentication and confidentiality -- Introduction to security analysis of blocks ciphers -- Introduction to cryptanalysis attacks on symmetric ciphers -- Public-key cryptosystems: RSA and finite field cryptography based schemes -- Public-key cryptosystems: elliptic curve cryptography -- Key management -- Digital certificate, public-key infrastructure, TLS, and Kerberos -- Generation of pseudorandom and prime numbers for cryptographic -- applications. | |
| 520 | _a"Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come"-- Amazon.com. | ||
| 650 | 0 | _aCryptography. | |
| 650 | 0 | _aComputer security. | |
| 710 | 2 |
_aJohn Wiley & Sons, _epublisher. |
|
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK _h005.824 _iM311c _kCIR _m2024 _n0 _e23 |
||
| 999 |
_c32045 _d32045 |
||