Handbook of Cryptographic Engineering /

This book has been written with the purpose of covering all aspects about Cryptographic Engineering.

Bibliographic Details
Main Author: Pedigo, Amina, author 639865
Format: text
Language:eng
Published: Delhi, India : World Technologies, 2012
Subjects:
Online Access:http://repository.library.utm.my/2595
_version_ 1796762778070941696
author Pedigo, Amina, author 639865
author_facet Pedigo, Amina, author 639865
author_sort Pedigo, Amina, author 639865
collection OCEAN
description This book has been written with the purpose of covering all aspects about Cryptographic Engineering.
first_indexed 2024-03-05T16:45:53Z
format text
id KOHA-OAI-TEST:593487
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T16:45:53Z
publishDate 2012
publisher Delhi, India : World Technologies,
record_format dspace
spelling KOHA-OAI-TEST:5934872022-03-29T09:07:45ZHandbook of Cryptographic Engineering / Pedigo, Amina, author 639865 text Electronic books 631902 Delhi, India : World Technologies,2012©2012engThis book has been written with the purpose of covering all aspects about Cryptographic Engineering.Cryptographic engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), electrical engineering(hardware design, ASIC, FPGAs) and computer science (algorithms, complexity theory, software design, embedded systems). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate.Chapter 1 - Cryptographic Engineering -- Chapter 2 - Steganography -- Chapter 3 - Autokey Cypher -- Chapter 4 - Blind Signature -- Chapter 5 - Backdoor (Computing) and Array Controller Based Encryption -- Chapter 6 - Cryptovirology and Ciphertext -- Chapter 7 - Code (Cryptography) -- Chapter 8 - Cryptographic Hash Function -- Chapter 9 - Deniable Encryption -- Chapter 10 - Elliptic Curve Cryptography -- Chapter 11 - Lamport Signature -- Chapter 12 - ID-Based Encryption -- Chapter 13 - Commitment Scheme -- Chapter 14 - Digital Signature -- Chapter 15 - Secure Communication -- Chapter 16 - Disk Encryption Theory.This book has been written with the purpose of covering all aspects about Cryptographic Engineering.Cryptographic engineering is the discipline of using cryptography to solve human problems. Cryptography is typically applied when trying to ensure data confidentiality, to authenticate people or devices, or to verify data integrity in risky environments. Cryptographic engineering is a complicated, multidisciplinary field. It encompasses mathematics (algebra, finite groups, rings, and fields), electrical engineering(hardware design, ASIC, FPGAs) and computer science (algorithms, complexity theory, software design, embedded systems). In order to practice state-of-the-art cryptographic design, mathematicians, computer scientists, and electrical engineers need to collaborate.PSZ_JBCryptographyhttp://repository.library.utm.my/2595URN:ISBN:9788132341482Remote access restricted to users with a valid UTM ID via VPN.
spellingShingle Cryptography
Pedigo, Amina, author 639865
Handbook of Cryptographic Engineering /
title Handbook of Cryptographic Engineering /
title_full Handbook of Cryptographic Engineering /
title_fullStr Handbook of Cryptographic Engineering /
title_full_unstemmed Handbook of Cryptographic Engineering /
title_short Handbook of Cryptographic Engineering /
title_sort handbook of cryptographic engineering
topic Cryptography
url http://repository.library.utm.my/2595
work_keys_str_mv AT pedigoaminaauthor639865 handbookofcryptographicengineering