𝔖 Scriptorium
✦   LIBER   ✦

📁

Modern Cryptography: Protect Your Data With Fast Block Ciphers

✍ Scribed by N. Goots, B. Izotov, A. Moldovyan, N. Moldovyan


Publisher
A-List Publishing
Year
2003
Tongue
English
Leaves
412
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book gives a general picture of modern cryptography and covers specific issues related to developing fast block ciphers using software and/or hardware implementation in a way that is easily understandable to a wide circle of readers.

✦ Subjects


Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;


📜 SIMILAR VOLUMES


Data-driven Block Ciphers for Fast Telec
✍ Nikolai Moldovyan, Alexander A. Moldovyan 📂 Library 📅 2007 🌐 English

The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fa

Modern Cryptography for Cybersecurity Pr
✍ Lisa Bock 📂 Library 📅 2021 🏛 Packt Publishing 🌐 English

<p><b>As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen data</b></p><h4>Key Features</h4><ul><li>Discover how cryptography is used to secure data in motion as well as at rest</li><li>Compa

Modern Cryptography for Cybersecurity Pr
✍ Lisa Bock 📂 Library 📅 2021 🏛 Packt Publishing 🌐 English

<p><b>As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen data</b></p><h4>Key Features</h4><ul><li>Discover how cryptography is used to secure data in motion as well as at rest</li><li>Compa

Modern Cryptography for Cybersecurity Pr
✍ Lisa Bock 📂 Library 📅 2021 🏛 Packt Publishing 🌐 English

As a Cybersecurity Professional, discover how to implement cryptographic techniques to help your organization mitigate the risks of altered, disclosed, or stolen dataKey Features* Discover how cryptography is used to secure data in motion as well as at rest* Compare symmetric with asymmetric encrypt