Cryptography in the information society / by Borrs Ryabko & Andrey Fionov
Material type: Computer fileLanguage: English Publication details: Singapore : World Scientific Publishing, 2021Description: 1 online resource (286, pages) : color illustrationsContent type:- text
- computer
- online resource
- 9789811226151 (e-book)
- QA76.9 A25R95 2021
Item type | Current library | Collection | Call number | Materials specified | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
Online E-Books | Ladislao N. Diwa Memorial Library Multimedia Section | Non-fiction | OEBP QA76.9 A25R95 2021 (Browse shelf(Opens below)) | Available | PAV | OEBP000337 | ||
Compact Discs | Ladislao N. Diwa Memorial Library Multimedia Section | Non-fiction | EB QA76.9 A25R95 2021 (Browse shelf(Opens below)) | Room use only | PAV | EB000337 |
Browsing Ladislao N. Diwa Memorial Library shelves, Shelving location: Multimedia Section, Collection: Non-fiction Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
EB QA76.5 C73 2014 Computer skills and applications / | EB QA76.5 P19 2020 Introduction to computer information systems / | EB QA76.9 A25Oz5 2022 Cybersecurity leadership demystified a comprehensive guide to becoming : a comprehensive guide to becoming a world-class modern cybersecurity leader and global CISO / | EB QA76.9 A25R95 2021 Cryptography in the information society / | EB QA76.9 P49 2021 The MongoDB workshop : a hands-on guide to using MongoDB and Atlas in the real world / | EB QA76.54 Am8 2020 Hands-on RTOS with microcontrollers : building real-time embedded systems using FreeRTOS, STM32 MCUs, and SEGGER debug tools / | EB QA76.73 C68 2020 Java software development with event B : a practical guide / |
https://portal.igpublish.com/iglibrary/ is required to read this e-book.
Includes bibliographical references and index
1. Introduction -- 2. Public key cryptosystems -- 3. Solving discrete logarithm problem -- 4. Digital signatures -- 5. Cryptographic protocols -- 6. Elliptic curve cryptosystems --7. Theoretical security of cryptosystems -- 8. Modern secret key ciphers and hash functions -- 9. Cryptocurrencies and the blockchain -- 10. Random numbers in cryptography -- 11. Steganography
"This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided"--
Fund 164 CE-Logic Purchased April 14, 2022 OEBP000337 Carmona Campus PHP No Price 0000 0000