Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Record no. 49879)

MARC details
000 -LEADER
fixed length control field 02013 a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250327153444.0
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783662690062
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82 PAA
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Paar, Christof
245 ## - TITLE STATEMENT
Title Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
250 ## - EDITION STATEMENT
Edition statement 2
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Name of publisher, distributor, etc Springer Verlag
Date of publication, distribution, etc 2024
Place of publication, distribution, etc Berlin, Germany
300 ## - PHYSICAL DESCRIPTION
Extent 543
520 ## - SUMMARY, ETC.
Summary, etc Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.<br/>Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications-ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.<br/>Topics and features:<br/>Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest<br/>Helps develop a comprehensive understanding of modern applied cryptography<br/>Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families<br/>Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion<br/>Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum<br/>Supplies up-to-date security parameters for all cryptographic algorithms<br/>Incorporates chapter reviews and discussion on such topics as historical and societal context
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Post-Quantum Algorithms
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Symmetric and Asymmetric
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Pelzl, Jan
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Güneysu, Tim
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Book
Source of classification or shelving scheme Dewey Decimal Classification

No items available.