000 | 01822nam a2200445 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20250314150758.0 | ||
008 | 250314s2024 njua b 001 0 eng d | ||
020 | _a9781394207480 | ||
040 |
_cQCPL _erda |
||
082 | _a005.824 | ||
100 | 1 |
_aMammeri, Zoubir _eauthor |
|
245 | 1 | 0 |
_aCryptography _b: algorithms, protocols, and standards for computer security _c/ Zoubir Mammeri |
264 | 1 |
_aHoboken, New Jersey : _bJohn Wiley & Sons, _c[2024] |
|
300 |
_axxii, 592 pages : _billustrations |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _aunmediated |
||
338 |
_2rdacarrier _avolume |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aIntroduction to computer security | |
505 | 0 | _aIntroduction to cryptography | |
505 | 0 | _aMathematical basics and computation algorithms for cryptography | |
505 | 0 | _aSymmetric ciphering : historical ciphers | |
505 | 0 | _aHash functions, message authentication codes, and digital signature | |
505 | 0 | _aStream ciphers | |
505 | 0 | _aBlock ciphers : basics, TDEA, and AES | |
505 | 0 | _aBlock cipher modes of operation for confidentiality | |
505 | 0 | _aBlock cipher modes of operation for authentication and confidentiality | |
505 | 0 | _aIntroduction to security analysis of block ciphers | |
505 | 0 | _aIntroduction to cryptanalysis attacks on symmetric ciphers | |
505 | 0 | _aPublic-key cryptosystems | |
505 | 0 | _aPublic-key cryptosystems : elliptic curve cryptography | |
505 | 0 | _aKey management | |
505 | 0 | _aDigital certificate, public-key infrastructure, TLS, and Kerberos | |
505 | 0 | _aGeneration of pseudorandom and prime numbers for cryptographic applications | |
650 | _aCryptography | ||
650 | _aComputer security | ||
690 |
_aComputers & technology _910971 |
||
942 |
_2ddc _cBOOK |
||
999 |
_c25656 _d25655 |