Understanding and Applying Cryptography and Data Security
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is des
1101596163
Understanding and Applying Cryptography and Data Security
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is des
77.99 In Stock
Understanding and Applying Cryptography and Data Security

Understanding and Applying Cryptography and Data Security

by Adam J. Elbirt
Understanding and Applying Cryptography and Data Security

Understanding and Applying Cryptography and Data Security

by Adam J. Elbirt

eBook

$77.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is des

Product Details

ISBN-13: 9781040167311
Publisher: CRC Press
Publication date: 04/09/2009
Sold by: Barnes & Noble
Format: eBook
Pages: 416
File size: 3 MB

Table of Contents

Introduction. Symmetric-Key Cryptography. Symmetric-Key Cryptography: Substitution Ciphers. Symmetric-Key Cryptography: Stream Ciphers. Symmetric-Key Cryptography: Block Ciphers. Public-Key Cryptography. Public-Key Cryptography: RSA. Public-Key Cryptography: Discrete Logarithms. Public-Key Cryptography: Elliptic Curves. Cryptographic Components. Cryptographic Protocols. References. Index.

What People are Saying About This

From the Publisher

This book is a good technical reference for someone who wishes to implement (or install) a security system based on existing techniques … a good complementary book for a technical course to students who already know about the theory of cryptography but need to learn the technical details in order to implement existing protocols in new hardware.
Jeremy Barbay, University of Chile, in SIGACT NEWS, December 2011

From the B&N Reads Blog

Customer Reviews