Imagen de cubierta local
Imagen de cubierta local
Imagen de OpenLibrary

Cryptography : algorithms, protocols,and standards for computer security / Zoubir Mammeri.

Por: Idioma: Inglés Hoboken : JW-Wiley , 2024Descripción: xxii, 592 páginas : figuras, ilustracionesTipo de contenido:
  • text
Tipo de medio:
  • unmediated
Tipo de soporte:
  • volume
ISBN:
  • 9781394207480
Tema(s): Clasificación CDD:
  • 005.824 M265c 2024
Contenidos:
1. Introduction to computer security.
2. Introduction to cryptography.
3. Mathematical basics and computation algorithms for cryptography.
4. Symmetric ciphering: historial ciphers.
5. Hash functions, message authentication codes, and digital signature.
6. Stream ciphers.
7. Block ciphers: basics, TDEA, an AES.
8. Block cipher modes of operation for confidenciality.
9. Block cipher modes of operation for authentication and confidenciality.
10. Introduction to security-analysis of block ciphers.
11. Introduction to cryptanalysis attack on symmetric ciphers.
12. Public-key cryptosystems.
13. Public-key cryptosystems: elliptic curve cryptography.
14. Key management.
15. Digital certificate, public-key infrastructure, TLS, and kerberos.
16. Generation of pseudorandom and prime numbers for cryptographic applications.
Existencias
Tipo de ítem Biblioteca actual Colección Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libros Biblioteca Central Estantería General 005.824 M265c 2024 (Navegar estantería(Abre debajo)) c.1 Disponible 025008

Incluye índice.

Incluye referencias bibliográficas al final de cada capítulo.

1. Introduction to computer security.

2. Introduction to cryptography.

3. Mathematical basics and computation algorithms for cryptography.

4. Symmetric ciphering: historial ciphers.

5. Hash functions, message authentication codes, and digital signature.

6. Stream ciphers.

7. Block ciphers: basics, TDEA, an AES.

8. Block cipher modes of operation for confidenciality.

9. Block cipher modes of operation for authentication and confidenciality.

10. Introduction to security-analysis of block ciphers.

11. Introduction to cryptanalysis attack on symmetric ciphers.

12. Public-key cryptosystems.

13. Public-key cryptosystems: elliptic curve cryptography.

14. Key management.

15. Digital certificate, public-key infrastructure, TLS, and kerberos.

16. Generation of pseudorandom and prime numbers for cryptographic applications.

Haga clic en una imagen para verla en el visor de imágenes

Imagen de cubierta local