Cryptography Algorithms : Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography

Enregistré dans:
Détails bibliographiques
Auteur principal: Bertaccini, Massimo. (Auteur)
Support: E-Book
Langue: Anglais
Publié: Birmingham : Packt Publishing.
Autres localisations: Voir dans le Sudoc
Résumé: Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptography. Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features: Explore the basic principles and history of cryptography ; Identify key vulnerabilities and evaluate how cryptographic algorithms defend against attacks ; Become a forward-thinking cryptographer by learning the new protocols in zero knowledge, homomorphic encryption and quantum cryptography. Book Description: This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today's cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise. What you will learn: Get to grips with essential encryption algorithms and their logical basics ; Identify the key vulnerabilities of AES, RSA, and many other symmetric and asymmetric algorithms ; Apply the logic and mathematics behind cryptographic attacks on asymmetric encryption ; Discover emerging technologies like zero-knowledge protocols and homomorphic encryption ; Understand fundamentals of lightweight encryption for IoT and discover a new algorithm in this fieldDive deep into quantum cryptography with the Shor and Grover algorithms. Who this book is for: This book is for beginners who are IT professionals, students, cybersecurity enthusiasts, and anyone who wants to develop skills in modern cryptography and build a successful cybersecurity career. The book systematically addresses mathematical issues related to the algorithms that may arise. However, a prior knowledge of university-level mathematics, algebra, its main operators, modular mathematics, and finite fields theory is required. Some knowledge of elliptic curves and quantum computing, especially matrices and plotting curves would also be beneficial to get the most out of this book
Accès en ligne: Accès à l'E-book
LEADER 04783nmm a2200553 i 4500
001 ebook-280851537
005 20241014154550.0
007 cu|uuu---uuuuu
008 241014s2024||||uk ||||g|||| ||||||eng d
020 |a 9781835087978 
035 |a FRCYB88958292 
035 |a FRCYB26088958292 
035 |a FRCYB14088958292 
035 |a FRCYB19188958292 
035 |a FRCYB24288958292 
035 |a FRCYB26888958292 
035 |a FRCYB27488958292 
035 |a FRCYB24788958292 
035 |a FRCYB24888958292 
035 |a FRCYB29388958292 
035 |a FRCYB29588958292 
035 |a FRCYB55488958292 
035 |a FRCYB55988958292 
035 |a FRCYB084688958292 
035 |a FRCYB085688958292 
035 |a FRCYB087588958292 
035 |a FRCYB087888958292 
035 |a FRCYB56788958292 
035 |a FRCYB095788958292 
035 |a FRCYB097088958292 
035 |a FRCYB087088958292 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
100 1 |a Bertaccini, Massimo.  |4 aut.  |e Auteur 
245 1 0 |a Cryptography Algorithms :  |b Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography   |c Massimo Bertaccini. 
264 1 |a Birmingham :  |b Packt Publishing. 
264 2 |a Paris :  |b Cyberlibris,  |c 2024. 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Couverture (https://static2.cyberlibris.com/books_upload/136pix/9781835087978.jpg). 
506 |a L'accès en ligne est réservé aux établissements ou bibliothèques ayant souscrit l'abonnement  |e Cyberlibris 
520 |a Get a head start in real-world cryptography by learning the logic of algorithms that defend against attacks, and explore the latest in IoT homomorphic encryption and quantum cryptography. Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features: Explore the basic principles and history of cryptography ; Identify key vulnerabilities and evaluate how cryptographic algorithms defend against attacks ; Become a forward-thinking cryptographer by learning the new protocols in zero knowledge, homomorphic encryption and quantum cryptography. Book Description: This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today's cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise. What you will learn: Get to grips with essential encryption algorithms and their logical basics ; Identify the key vulnerabilities of AES, RSA, and many other symmetric and asymmetric algorithms ; Apply the logic and mathematics behind cryptographic attacks on asymmetric encryption ; Discover emerging technologies like zero-knowledge protocols and homomorphic encryption ; Understand fundamentals of lightweight encryption for IoT and discover a new algorithm in this fieldDive deep into quantum cryptography with the Shor and Grover algorithms. Who this book is for: This book is for beginners who are IT professionals, students, cybersecurity enthusiasts, and anyone who wants to develop skills in modern cryptography and build a successful cybersecurity career. The book systematically addresses mathematical issues related to the algorithms that may arise. However, a prior knowledge of university-level mathematics, algebra, its main operators, modular mathematics, and finite fields theory is required. Some knowledge of elliptic curves and quantum computing, especially matrices and plotting curves would also be beneficial to get the most out of this book 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88958292  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 280851537