Local cover image
Local cover image

Cryptography : algorithms, protocols, and standards for computer security / Zoubir Mammeri

By: Material type: TextTextPublisher: Hoboken, New Jersey : John Wiley & Sons, [2024]Description: xxii, 592 pages : illustrationsContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781394207480
Subject(s): DDC classification:
  • 005.824
Contents:
Introduction to computer security
Introduction to cryptography
Mathematical basics and computation algorithms for cryptography
Symmetric ciphering : historical ciphers
Hash functions, message authentication codes, and digital signature
Stream ciphers
Block ciphers : basics, TDEA, and AES
Block cipher modes of operation for confidentiality
Block cipher modes of operation for authentication and confidentiality
Introduction to security analysis of block ciphers
Introduction to cryptanalysis attacks on symmetric ciphers
Public-key cryptosystems
Public-key cryptosystems : elliptic curve cryptography
Key management
Digital certificate, public-key infrastructure, TLS, and Kerberos
Generation of pseudorandom and prime numbers for cryptographic applications
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Barcode
Book Book Lagro Branch Reference Section Reference R 005.824 M265c 2024 (Browse shelf(Opens below)) c. 2 Room use only 57738QC
Book Book Main Library Reference Section Reference R 005.824 M265c 2024 (Browse shelf(Opens below)) c. 1 Room use only 57737QC

Includes bibliographical references and index.

Introduction to computer security

Introduction to cryptography

Mathematical basics and computation algorithms for cryptography

Symmetric ciphering : historical ciphers

Hash functions, message authentication codes, and digital signature

Stream ciphers

Block ciphers : basics, TDEA, and AES

Block cipher modes of operation for confidentiality

Block cipher modes of operation for authentication and confidentiality

Introduction to security analysis of block ciphers

Introduction to cryptanalysis attacks on symmetric ciphers

Public-key cryptosystems

Public-key cryptosystems : elliptic curve cryptography

Key management

Digital certificate, public-key infrastructure, TLS, and Kerberos

Generation of pseudorandom and prime numbers for cryptographic applications

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image