Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms (Record no. 49879)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02013 a2200217 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250327153444.0 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783662690062 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.82 PAA |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Paar, Christof |
245 ## - TITLE STATEMENT | |
Title | Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms |
250 ## - EDITION STATEMENT | |
Edition statement | 2 |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Name of publisher, distributor, etc | Springer Verlag |
Date of publication, distribution, etc | 2024 |
Place of publication, distribution, etc | Berlin, Germany |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 543 |
520 ## - SUMMARY, ETC. | |
Summary, etc | Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.<br/>Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications-ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.<br/>Topics and features:<br/>Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest<br/>Helps develop a comprehensive understanding of modern applied cryptography<br/>Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families<br/>Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion<br/>Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum<br/>Supplies up-to-date security parameters for all cryptographic algorithms<br/>Incorporates chapter reviews and discussion on such topics as historical and societal context |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Post-Quantum Algorithms |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Symmetric and Asymmetric |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Pelzl, Jan |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | Güneysu, Tim |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | Book |
Source of classification or shelving scheme | Dewey Decimal Classification |
No items available.