Artículos relacionados a Classical and Modern Cryptography for Beginners

Classical and Modern Cryptography for Beginners - Tapa blanda

 
9783031329616: Classical and Modern Cryptography for Beginners

Sinopsis

This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms.  Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.

Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. 

This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.

"Sinopsis" puede pertenecer a otra edición de este libro.

Acerca del autor

Rajkumar Banoth, B.Tech, M.Tech & Ph.D, Associate Professor of Instruction, University of Texas San Antonio (UTSA), USA. He is an IEEE senior members, Computer Society of India(CSI), The Institution of Engineers (India), ISTE. He is also  CISCO-Cyber Security Operations Certified Trainer of CCNA, CCNP, Network Security and Penetration Testing.He is a Scientific Editorial board member of International journal of research and applications, International Computer Science and Engineering Society (ICSES), Associate Editor-In-Chief, Indian Journal of Cryptography and Network Security (IJCNS). He is a reviewer of the journals, IEEE Transactions on Mobile Computing, IEEE Transactions on Computing in Science and Engineering, IEEE Transactions on Intelligent systems, IEEE Transactions on Internet Computing.

He has granted the patents titled with” System and Method for Providing Cyber Security in Big Data”, “Smart Bathroom System and Method”, “Machine Learning BasedWireless Network Modelling Based on Genetic Algorithm for Robotic”. He has Published  eight text books comprising domains Networking, Computer Organization and Architecture and Computer Forensic, Published  Hi-indexed IEEE,SCI and Scopus Journals and Presented nine Conference papers.

He awarded as “INSC Research Excellence Award -2022”, “CISCO Instructor Excellence Advanced award”, “IBM Certified Academic Associate – DB2 9 Database”, “IBM Certified Deployment Professional - Tivoli Directory Server V6.1”.

He Established Artificial Intelligence (AI) and Machine Learning (ML) integrated (IoT)) Laboratory  in Warangal, India, CISCO Networking Academy at SREC, Vaagdevi Engineering College and Shreyas Institute of Engineering and Technology India, IBM Centre of Excellence at SREC, Warangal.

Rekha Regar, B.Tech, M.Tech, (PhD), She is a  PhD Scholar at Centre of Excellence in Artificial Intelligence, Indian Institute of Technology, Kharagpur,India. She has done Master of Technology in Information Security from National Institute of Technology, Jalandhar, India. She has done Bachelor of Engineering in Computer Science & Engineering from M. B. M. Engineering college, Jodhpur, India

De la contraportada

This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.

Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet.

This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.

"Sobre este título" puede pertenecer a otra edición de este libro.

Comprar usado

Condición: Como Nuevo
Unread book in perfect condition...
Ver este artículo

EUR 2,25 gastos de envío en Estados Unidos de America

Destinos, gastos y plazos de envío

Comprar nuevo

Ver este artículo

EUR 2,25 gastos de envío en Estados Unidos de America

Destinos, gastos y plazos de envío

Otras ediciones populares con el mismo título

9783031329586: Classical and Modern Cryptography for Beginners

Edición Destacada

ISBN 10:  3031329589 ISBN 13:  9783031329586
Editorial: Springer, 2023
Tapa dura

Resultados de la búsqueda para Classical and Modern Cryptography for Beginners

Imagen de archivo

Banoth, Rajkumar; Regar, Rekha
Publicado por Springer, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo Tapa blanda

Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Nº de ref. del artículo: 46847557-n

Contactar al vendedor

Comprar nuevo

EUR 59,15
Convertir moneda
Gastos de envío: EUR 2,25
A Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen de archivo

Rajkumar Banoth
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo Paperback

Librería: Grand Eagle Retail, Mason, OH, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: new. Paperback. This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Nº de ref. del artículo: 9783031329616

Contactar al vendedor

Comprar nuevo

EUR 61,47
Convertir moneda
Gastos de envío: GRATIS
A Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Imagen de archivo

Rajkumar Banoth
Publicado por Springer, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo PAP

Librería: PBShop.store US, Wood Dale, IL, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: GB-9783031329616

Contactar al vendedor

Comprar nuevo

EUR 62,59
Convertir moneda
Gastos de envío: GRATIS
A Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Rajkumar Banoth
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo PAP

Librería: PBShop.store UK, Fairford, GLOS, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

PAP. Condición: New. New Book. Shipped from UK. Established seller since 2000. Nº de ref. del artículo: GB-9783031329616

Contactar al vendedor

Comprar nuevo

EUR 58,42
Convertir moneda
Gastos de envío: EUR 4,77
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Banoth, Rajkumar
Publicado por Springer, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo Tapa blanda
Impresión bajo demanda

Librería: Brook Bookstore On Demand, Napoli, NA, Italia

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: new. Questo è un articolo print on demand. Nº de ref. del artículo: BORHIRP9FJ

Contactar al vendedor

Comprar nuevo

EUR 58,23
Convertir moneda
Gastos de envío: EUR 5,50
De Italia a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: Más de 20 disponibles

Añadir al carrito

Imagen de archivo

Banoth, Rajkumar; Regar, Rekha
Publicado por Springer, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Antiguo o usado Tapa blanda

Librería: GreatBookPrices, Columbia, MD, Estados Unidos de America

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: As New. Unread book in perfect condition. Nº de ref. del artículo: 46847557

Contactar al vendedor

Comprar usado

EUR 66,01
Convertir moneda
Gastos de envío: EUR 2,25
A Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen de archivo

Banoth, Rajkumar; Regar, Rekha
Publicado por Springer, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo Tapa blanda

Librería: GreatBookPricesUK, Woodford Green, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. Nº de ref. del artículo: 46847557-n

Contactar al vendedor

Comprar nuevo

EUR 58,41
Convertir moneda
Gastos de envío: EUR 17,18
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen de archivo

Banoth, Rajkumar; Regar, Rekha
Publicado por Springer, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo Tapa blanda

Librería: Ria Christie Collections, Uxbridge, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Condición: New. In. Nº de ref. del artículo: ria9783031329616_new

Contactar al vendedor

Comprar nuevo

EUR 63,28
Convertir moneda
Gastos de envío: EUR 13,72
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 2 disponibles

Añadir al carrito

Imagen de archivo

Banoth, Rajkumar Rajkumar Banoth, Rekha Regar,
Publicado por Springer -, 2024
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo paperback

Librería: Chiron Media, Wallingford, Reino Unido

Calificación del vendedor: 4 de 5 estrellas Valoración 4 estrellas, Más información sobre las valoraciones de los vendedores

paperback. Condición: New. Nº de ref. del artículo: 6666-GRD-9783031329616

Contactar al vendedor

Comprar nuevo

EUR 59,72
Convertir moneda
Gastos de envío: EUR 17,74
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 3 disponibles

Añadir al carrito

Imagen del vendedor

Rajkumar Banoth, Rekha Regar
ISBN 10: 3031329619 ISBN 13: 9783031329616
Nuevo Paperback

Librería: Rarewaves.com USA, London, LONDO, Reino Unido

Calificación del vendedor: 5 de 5 estrellas Valoración 5 estrellas, Más información sobre las valoraciones de los vendedores

Paperback. Condición: New. 2023 ed. This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques.  It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms.  Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network.Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful. Nº de ref. del artículo: LU-9783031329616

Contactar al vendedor

Comprar nuevo

EUR 80,83
Convertir moneda
Gastos de envío: GRATIS
De Reino Unido a Estados Unidos de America
Destinos, gastos y plazos de envío

Cantidad disponible: 1 disponibles

Añadir al carrito

Existen otras 13 copia(s) de este libro

Ver todos los resultados de su búsqueda