Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.
Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications―ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.
Topics and features:
This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers.
The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, from which they have drawn important lessons for their teaching.
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.
Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.
Topics and features:
This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers.
The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, from whichthey have drawn important lessons for their teaching.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Anbieter: Books From California, Simi Valley, CA, USA
hardcover. Zustand: Good. The binding is curved. The copy shows minor external wear, but is in otherwise clean condition. Artikel-Nr. mon0003923673
Anbieter: Books From California, Simi Valley, CA, USA
hardcover. Zustand: Very Good. Artikel-Nr. mon0003812436
Anzahl: 11 verfügbar
Anbieter: Dream Books Co., Denver, CO, USA
Zustand: good. Gently used with minimal wear on the corners and cover. A few pages may contain light highlighting or writing, but the text remains fully legible. Dust jacket may be missing, and supplemental materials like CDs or codes may not be included. May be ex-library with library markings. Ships promptly! Artikel-Nr. DBV.3662690063.G
Anbieter: moluna, Greven, Deutschland
Gebunden. Zustand: New. Artikel-Nr. 1429714717
Anzahl: Mehr als 20 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.Heavily revised and updated, the long-awaitedsecond editionofUnderstanding Cryptographyfollows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basiccryptography concepts, this seminal textbookcovers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithmscurrently in use inapplications-ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.Topics and features:Opens with a foreword by cryptography pioneer and Turing Award winner, Ron RivestHelps develop a comprehensive understanding of modern applied cryptographyProvides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher familiesIncludes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussionCommunicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimumSupplies up-to-date security parameters for all cryptographic algorithmsIncorporates chapter reviews and discussion on such topics as historical and societal contextThis must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers.The authors have more than 20 years' experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching. Artikel-Nr. 9783662690062
Anzahl: 1 verfügbar