000 | 02013 a2200217 4500 | ||
---|---|---|---|
005 | 20250327153444.0 | ||
020 | _a9783662690062 | ||
082 | _a005.82 PAA | ||
100 | _aPaar, Christof | ||
245 | _aUnderstanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms | ||
250 | _a2 | ||
260 |
_bSpringer Verlag _c2024 _aBerlin, Germany |
||
300 | _a543 | ||
520 | _aUnderstanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant. Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications-ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies. Topics and features: Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest Helps develop a comprehensive understanding of modern applied cryptography Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum Supplies up-to-date security parameters for all cryptographic algorithms Incorporates chapter reviews and discussion on such topics as historical and societal context | ||
650 | _aCryptography | ||
650 | _aPost-Quantum Algorithms | ||
650 | _aSymmetric and Asymmetric | ||
700 | _aPelzl, Jan | ||
700 | _aGüneysu, Tim | ||
942 |
_cBK _2ddc |
||
999 |
_c49879 _d49879 |