A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is des
Rezensionen / Stimmen
This book is a good technical reference for someone who wishes to implement (or install) a security system based on existing techniques ... a good complementary book for a technical course to students who already know about the theory of cryptography but need to learn the technical details in order to implement existing protocols in new hardware.-Jeremy Barbay, University of Chile, in SIGACT NEWS, December 2011 This book is a good technical reference for someone who wishes to implement (or install) a security system based on existing techniques ... a good complementary book for a technical course to students who already know about the theory of cryptography but need to learn the technical details in order to implement existing protocols in new hardware.
-Jeremy Barbay, University of Chile, in SIGACT NEWS, December 2011
Auflage
Sprache
Verlagsort
Verlagsgruppe
Zielgruppe
Für Beruf und Forschung
Electrical engineering and computer science students, electrical engineers and computer scientists seeking mathematical background fro cryptography methods.
Illustrationen
65 s/w Abbildungen, 24 s/w Tabellen
65 b/w images, 24 tables and 50 equations
ISBN-13
978-1-4200-6161-1 (9781420061611)
Copyright in bibliographic data and cover images is held by Nielsen Book Services Limited or by the publishers or by their respective licensors: all rights reserved.
Schweitzer Klassifikation
Introduction. Symmetric-Key Cryptography. Symmetric-Key Cryptography: Substitution Ciphers. Symmetric-Key Cryptography: Stream Ciphers. Symmetric-Key Cryptography: Block Ciphers. Public-Key Cryptography. Public-Key Cryptography: RSA. Public-Key Cryptography: Discrete Logarithms. Public-Key Cryptography: Elliptic Curves. Cryptographic Components. Cryptographic Protocols. References. Index.