Emerging Security Algorithms and Techniques Emerging Security Algorithms and Techniques

Emerging Security Algorithms and Techniques

Khaleel Ahmad and Others
    • €62.99
    • €62.99

Publisher Description

Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources. In other words, cyber security focuses on protecting computers, networks, programs and data (in use, in rest, in motion) from unauthorized or unintended access, change or destruction. Therefore, strengthening the security and resilience of cyberspace has become a vital homeland security mission.

Cyber security attacks are growing exponentially. Security specialists must occupy in the lab, concocting new schemes to preserve the resources and to control any new attacks. Therefore, there are various emerging algorithms and techniques viz. DES, AES, IDEA, WAKE, CAST5, Serpent Algorithm, Chaos-Based Cryptography McEliece, Niederreiter, NTRU, Goldreich–Goldwasser–Halevi, Identity Based Encryption, and Attribute Based Encryption.

There are numerous applications of security algorithms like cyber security, web security, e-commerce, database security, smart card technology, mobile security, cloud security, digital signature, etc.

The book offers comprehensive coverage of the most essential topics, including:
Modular Arithmetic, Finite Fields Prime Number, DLP, Integer Factorization Problem Symmetric Cryptography Asymmetric Cryptography Post-Quantum Cryptography Identity Based Encryption Attribute Based Encryption Key Management Entity Authentication, Message Authentication Digital Signatures Hands-On "SageMath"
This book serves as a textbook/reference book for UG, PG, PhD students, Teachers, Researchers and Engineers in the disciplines of Information Technology, Computer Science and Engineering, and Electronics and Communication Engineering.

GENRE
Computing & Internet
RELEASED
2019
20 May
LANGUAGE
EN
English
LENGTH
330
Pages
PUBLISHER
CRC Press
SIZE
18.3
MB
Cryptography and Cryptanalysis in Java Cryptography and Cryptanalysis in Java
2022
Pro Cryptography and Cryptanalysis with C++20 Pro Cryptography and Cryptanalysis with C++20
2021
Security and Cryptography for Networks Security and Cryptography for Networks
2008
Information Security Practice and Experience Information Security Practice and Experience
2011
Advances in Information and Computer Security Advances in Information and Computer Security
2008
New Directions of Modern Cryptography New Directions of Modern Cryptography
2012
Fostering Machine Learning and IoT for Blockchain Technology Fostering Machine Learning and IoT for Blockchain Technology
2025
Fostering Machine Learning and IoT for Blockchain Technology Fostering Machine Learning and IoT for Blockchain Technology
2025
Opportunistic Networks Opportunistic Networks
2018
Machine Learning and Big Data Machine Learning and Big Data
2020