1 option
Practical cryptography : algorithms and implementations using C++ / edited by Saiful Azad, Al-Sakib Khan Pathan.
- Format:
- Book
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Coding theory.
- Cryptography--Data processing.
- Cryptography.
- C++ (Computer program language).
- Physical Description:
- 1 online resource (358 p.)
- Edition:
- 1st edition
- Other Title:
- Algorithms and implementations using C++
- Place of Publication:
- Boca Raton : CRC Press, [2015]
- Language Note:
- English
- System Details:
- text file
- Summary:
- Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language.Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography-- Provided by publisher.
- Contents:
- Front Cover; Contents; Preface; Acknowledgments; About the Editors; Contributors; Chapter 1: Basics of Security and Cryptography; Chapter 2: Classical Cryptographic Algorithms; Chapter 3: Rotor Machine; Chapter 4: Block Cipher; Chapter 5: Data Encryption Standard; Chapter 6: Advanced Encryption Standard; Chapter 7: Asymmetric Key Algorithms; Chapter 8: The RSA Algorithm; Chapter 9: Elliptic Curve Cryptography; Chapter 10: Message Digest Algorithm 5; Chapter 11: Secure Hash Algorithm; Chapter 12: Fundamentals of Identity-Based Cryptography
- Chapter 13: Symmetric Key Encryption Acceleration on Heterogeneous Many-Core ArchitecturesChapter 14: Methods and Algorithms for Fast Hashing in Data Streaming; Back Cover
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and index.
- Description based on print version record.
- ISBN:
- 9781040177563
- 1040177565
- 9780367378158
- 0367378159
- 9780429172342
- 0429172346
- 9781482228908
- 1482228904
- OCLC:
- 894169881
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.