Emerging Security Algorithms and Techniques

Emerging Security Algorithms and Techniques
by:Khaleel Ahmad
ISBN-10 书号:0815361459
ISBN-13 书号:9780815361459
Edition 版次:1
Release Finelybook 出版日期:2019-06-04
pages 页数:330 pages

Book Description
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.
Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.
There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.
The book offers comprehensive coverage of the most essential topics, including:

Modular Arithmetic, Finite Fields
Prime Number, DLP, Integer Factorization Problem
Symmetric Cryptography
Asymmetric Cryptography
Post-Quantum Cryptography
Identity Based Encryption
Attribute Based Encryption
Key Management
Entity Authentication, Message Authentication
Digital Signatures
Hands-On “SageMath”
This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.
1.Modular Arithmetic
2.Finite Fields
3.Prime Number
4.Discrete Logarithm Problem
5.Integer Factorization Problem
6.Symmetric AlgorithmsI
7.Symmetric Algorithms ll
8.Asymmetric Cryptography
9.Post-Quantum Cryptography
10.Identity-Based Encryption
11.Attribute-Based Encryption
12.Key Management
13.Entity Authentication
14.Message Authentication
15.Digital Signatures


Emerging Security Algorithms and Techniques 9780815361459.zip

赞(1) 觉得文章有用就打赏一下
未经允许不得转载:finelybook » Emerging Security Algorithms and Techniques

评论 下载问题及网盘链接失效反馈!