Emerging Security Algorithms and Techniques

Emerging Security Algorithms and Techniques

ISBN: 0815361459 | 2019 | EPUB | 330 Pages | 11 MB

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich-Goldwasser-Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:

Modular Arithmetic, Finite Fields
Prime Number, DLP, Integer Factorization Problem
Symmetric Cryptography
Asymmetric Cryptography
Post-Quantum Cryptography
Identity Based Encryption
Attribute Based Encryption
Key Management
Entity Authentication, Message Authentication
Digital Signatures
Hands-On "SageMath"
This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.



[Fast Download] Emerging Security Algorithms and Techniques

Related eBooks:
Lattice-Based Public-Key Cryptography in Hardware
A Course in Cryptography
Optical Coding Theory with Prime
Modern Cryptanalysis: Techniques for Advanced Code Breaking
Cryptography and Coding
Information Security and Cryptology: 10th International Conference, Inscrypt 2014
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age dy Steven Levy
Timing Channels in Cryptography: A Micro-Architectural Perspective
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, an
Information Security and Privacy: 13th Australasian Conference, ACISP 2008, Wollongong, Australia, J
Advances in Cryptology - EUROCRYPT 2015: 34th Annual International Conference on the Theory and Appl
Introduction to Cryptography: Principles and Applications, 3rd edition
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.