ISBN13: | 9781032832845 |
ISBN10: | 1032832843 |
Kötéstípus: | Keménykötés |
Terjedelem: | 306 oldal |
Méret: | 234x156 mm |
Nyelv: | angol |
Illusztrációk: | 104 Illustrations, black & white; 51 Halftones, black & white; 53 Line drawings, black & white; 24 Tables, black & white |
700 |
Villamosmérnöki tudományok, híradástechnika, műszeripar
Energetika, energiaipar
A számítástudomány elmélete, a számítástechnika általában
Szoftverfejlesztés
Mesterséges intelligencia
Környezetmérnöki tudományok
Alkalmazott nyelvészet
Villamosmérnöki tudományok, híradástechnika, műszeripar (karitatív célú kampány)
Energetika, energiaipar (karitatív célú kampány)
A számítástudomány elmélete, a számítástechnika általában (karitatív célú kampány)
Szoftverfejlesztés (karitatív célú kampány)
Mesterséges intelligencia (karitatív célú kampány)
Környezetmérnöki tudományok (karitatív célú kampány)
Alkalmazott nyelvészet (karitatív célú kampány)
Next Generation Mechanisms for Data Encryption
GBP 120.00
Kattintson ide a feliratkozáshoz
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data such as asymmetry encryption, digital signatures, and hash functions. It also covers the mathematics behind the use of algorithms for encryption and decryption.
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption.
Features
- Presents clear insight to the readers about the various security algorithms and the different mechanisms used for data encryption.
- Discusses algorithms such as symmetric encryption, asymmetric encryption, digital signatures, and hash functions used for encryption.
- Covers techniques and methods to optimize the mathematical steps of security algorithms to make those algorithms lightweight, which can be suitable for voice encryption.
- Illustrates software methods to implement cryptography algorithms.
- Highlights a comparative analysis of models that are used in implementing cryptography algorithms.
The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology.
1. Oepning the Vault for Securing the Communication: An Introduction to Cryptography. 2. Guardians of Privacy: Unrevaling Public-Key Cryptography. 3. Cryptography Algorithms to Prevent the Different Security Attacks. 4. Hash Functions and Message Digest. 5. Quantum Cryptography. 6. Cryptanalysis using Crypt Tool and Alpha Peeler. 7. Quantum Cryptography: An In-Depth Exploration of Principles and Techniques. 8. Securing Patient Information: A Multi-layered Cryptographic Approach in IoT Healthcare. 9. Exploring Advancements, Applications, and Challenges in the Realm of Quantum Cryptography. 10. Cryptography in Industry: Safeguarding Digital Assets and Transactions. 11. Cryptography in Practice. 12. Output Load Capacitance Scaling Based Low Power Design of ECC Algorithm. 13. Implementation of Lattice Based Cryptography Cyber Forensic System. 14. Cryptography in Digital Forensics. 15. Cryptography Tools in Ethical Hacking. 16. Exploring the Future Trends of Cryptography. 17. Safeguarding the Future through the Prevention of Cybercrime in the Quantum Computing Era. 18. Low Power Design of DES Encryption Algorithm on 28 nm FPGA Using HSTL IO Standard.