179,27 €
199,19 €
-10% with code: EXTRA
Cryptography in the Information Society
Cryptography in the Information Society
179,27
199,19 €
  • We will send in 10–14 business days.
This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in…
  • SAVE -10% with code: EXTRA

Cryptography in the Information Society (e-book) (used book) | bookbook.eu

Reviews

Description

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

EXTRA 10 % discount with code: EXTRA

179,27
199,19 €
We will send in 10–14 business days.

The promotion ends in 19d.23:08:33

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,99 Book Euros!?

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)