000 03137cam a22003858i 4500
001 23243979
003 CSPC
005 20260312115356.0
008 230725s2024 nju b 001 0 eng c
010 _a 2023030470
020 _a9781394207480
035 _a23243979
040 _aMdU/DLC
_beng
_erda
_cDLC
_dDLC
_dCSPC
042 _apcc
050 0 0 _aQA268
_b.M34 2024
082 0 0 _a005.824
_bM311c
_223/eng/20230807
100 1 _aMammeri, Zoubir,
_eauthor.
245 1 0 _aCryptography :
_balgorithms, protocols, and standards for computer security /
_cZoubir Z Mammeri.
263 _a2401
264 1 _aHoboken, New Jersey :
_bJohn Wiley & Sons, Inc.,
_c2024.
300 _axxii, 592 pages :
_billustrations ;
_c28 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction to computer security -- Introduction to cryptography -- Mathematical basics and computation algorithms for cryptography -- Symmetric ciphering: historical ciphers -- Hash functions, message authentication codes, and digital signature -- Stream ciphers -- Block ciphers: basics, TDEA, and AES -- Block cipher modes of operation for confidentiality -- Block cipher modes of operation for authentication and confidentiality -- Introduction to security analysis of blocks ciphers -- Introduction to cryptanalysis attacks on symmetric ciphers -- Public-key cryptosystems: RSA and finite field cryptography based schemes -- Public-key cryptosystems: elliptic curve cryptography -- Key management -- Digital certificate, public-key infrastructure, TLS, and Kerberos -- Generation of pseudorandom and prime numbers for cryptographic -- applications.
520 _a"Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come"-- Amazon.com.
650 0 _aCryptography.
650 0 _aComputer security.
710 2 _aJohn Wiley & Sons,
_epublisher.
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK
_h005.824
_iM311c
_kCIR
_m2024
_n0
_e23
999 _c32045
_d32045