|
Showing 1 - 2 of
2 matches in All Departments
Cryptography is now ubiquitous - moving beyond the traditional
environments, such as government communications and banking
systems, we see cryptographic techniques realized in Web browsers,
e-mail programs, cell phones, manufacturing systems, embedded
software, smart buildings, cars, and even medical implants. Today's
designers need a comprehensive understanding of applied
cryptography. After an introduction to cryptography and data
security, the authors explain the main techniques in modern
cryptography, with chapters addressing stream ciphers, the Data
Encryption Standard (DES) and 3DES, the Advanced Encryption
Standard (AES), block ciphers, the RSA cryptosystem, public-key
cryptosystems based on the discrete logarithm problem,
elliptic-curve cryptography (ECC), digital signatures, hash
functions, Message Authentication Codes (MACs), and methods for key
establishment, including certificates and public-key infrastructure
(PKI). Throughout the book, the authors focus on communicating the
essentials and keeping the mathematics to a minimum, and they move
quickly from explaining the foundations to describing practical
implementations, including recent topics such as lightweight
ciphers for RFIDs and mobile devices, and current key-length
recommendations. The authors have considerable experience teaching
applied cryptography to engineering and computer science students
and to professionals, and they make extensive use of examples,
problems, and chapter reviews, while the book's website offers
slides, projects and links to further resources. This is a suitable
textbook for graduate and advanced undergraduate courses and also
for self-study by engineers.
Das Buch gibt eine umfassende Einfuhrung in moderne angewandte
Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren
mit praktischer Relevanz. Es werden symmetrische Verfahren (DES,
AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA,
Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen,
Hash-Funktionen, Message Authentication Codes sowie
Schlusselaustauschprotokolle vorgestellt. Fur alle Krypto-Verfahren
werden aktuelle Sicherheitseinschatzungen und
Implementierungseigenschaften beschrieben.
|
You may like...
Widows
Viola Davis, Michelle Rodriguez, …
Blu-ray disc
R22
R19
Discovery Miles 190
Ab Wheel
R209
R149
Discovery Miles 1 490
The Car
Arctic Monkeys
CD
R383
Discovery Miles 3 830
|