Handbook of Cryptographic Engineering /
This book has been written with the purpose of covering all aspects about Cryptographic Engineering.
Main Author: | |
---|---|
Format: | text |
Language: | eng |
Published: |
Delhi, India : World Technologies,
2012
|
Subjects: | |
Online Access: | http://repository.library.utm.my/2595 |
_version_ | 1796762778070941696 |
---|---|
author | Pedigo, Amina, author 639865 |
author_facet | Pedigo, Amina, author 639865 |
author_sort | Pedigo, Amina, author 639865 |
collection | OCEAN |
description | This book has been written with the purpose of covering all aspects about Cryptographic Engineering. |
first_indexed | 2024-03-05T16:45:53Z |
format | text |
id | KOHA-OAI-TEST:593487 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T16:45:53Z |
publishDate | 2012 |
publisher | Delhi, India : World Technologies, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5934872022-03-29T09:07:45ZHandbook of Cryptographic Engineering / Pedigo, Amina, author 639865 text Electronic books 631902 Delhi, India : World Technologies,2012©2012engThis book has been written with the purpose of covering all aspects about Cryptographic Engineering.Cryptographic engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), electrical engineering(hardware design, ASIC, FPGAs) and computer science (algorithms, complexity theory, software design, embedded systems). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate.Chapter 1 - Cryptographic Engineering -- Chapter 2 - Steganography -- Chapter 3 - Autokey Cypher -- Chapter 4 - Blind Signature -- Chapter 5 - Backdoor (Computing) and Array Controller Based Encryption -- Chapter 6 - Cryptovirology and Ciphertext -- Chapter 7 - Code (Cryptography) -- Chapter 8 - Cryptographic Hash Function -- Chapter 9 - Deniable Encryption -- Chapter 10 - Elliptic Curve Cryptography -- Chapter 11 - Lamport Signature -- Chapter 12 - ID-Based Encryption -- Chapter 13 - Commitment Scheme -- Chapter 14 - Digital Signature -- Chapter 15 - Secure Communication -- Chapter 16 - Disk Encryption Theory.This book has been written with the purpose of covering all aspects about Cryptographic Engineering.Cryptographic engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), electrical engineering(hardware design, ASIC, FPGAs) and computer science (algorithms, complexity theory, software design, embedded systems). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate.PSZ_JBCryptographyhttp://repository.library.utm.my/2595URN:ISBN:9788132341482Remote access restricted to users with a valid UTM ID via VPN. |
spellingShingle | Cryptography Pedigo, Amina, author 639865 Handbook of Cryptographic Engineering / |
title | Handbook of Cryptographic Engineering / |
title_full | Handbook of Cryptographic Engineering / |
title_fullStr | Handbook of Cryptographic Engineering / |
title_full_unstemmed | Handbook of Cryptographic Engineering / |
title_short | Handbook of Cryptographic Engineering / |
title_sort | handbook of cryptographic engineering |
topic | Cryptography |
url | http://repository.library.utm.my/2595 |
work_keys_str_mv | AT pedigoaminaauthor639865 handbookofcryptographicengineering |