Applied cryptography for researchers and practitioners

دانلود کتاب Applied cryptography for researchers and practitioners

31000 تومان موجود

کتاب رمزنگاری کاربردی برای محققان و پزشکان نسخه زبان اصلی

دانلود کتاب رمزنگاری کاربردی برای محققان و پزشکان بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد

این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 5


توضیحاتی در مورد کتاب Applied cryptography for researchers and practitioners

نام کتاب : Applied cryptography for researchers and practitioners
عنوان ترجمه شده به فارسی : رمزنگاری کاربردی برای محققان و پزشکان
سری :
نویسندگان : ,
ناشر : Nova Science
سال نشر : 2023
تعداد صفحات : 127

زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 8 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Contents
Preface
Chapter 1
Introduction to Cryptography
1.1. Need for Security
1.2. Types of Attacks
1.3. Classification of Cryptography Algorithms
1.3.1. Symmetric Key Cryptography
1.3.2. Asymmetric Key Cryptography
1.3.3. Hash Functions
Chapter 2
A Note on Traditional and Asymmetric Algorithms
2.1. Key Exchange Algorithm
2.2. History of RSA
2.3. El Gamal Algorithm
2.4. Elliptic Curve Cryptography: Need of the Hour
Chapter 3
Symmetric Cryptography: From a Traditional Approach to Recent Trends
3.1. Most Used Symmetric Cryptography Algorithm
3.2. Need of Symmetric Cryptographic Algorithm
3.3. PRESENT 80: Need of the Hour
3.4. Traditional vs. Recent Symmetric Cryptographic Algorithm
Chapter 4
Cryptographically Secure Pseudo-Random Number Generator
4.1. Pseudo and True Random Number Generators
4.2. Properties of a Cryptographically Secure Pseudo–Random Number Generator
4.2.1. Definition 1: Cryptographically Secure Pseudo–Random Bit Generator
4.2.2. Definition 2: Next-Bit Unpredictable
4.3. A Note on Existing Pseudo–Random Number Generators and Proposing a New Cryptographically Secure Pseudo–Random Bits Generator
4.3.1. Randomized Number of Seconds Between Two Dates
4.3.2. Security of Proposed Approach
4.4. NIST Statistical Suit for Testing the Randomness of the Proposed Cryptographically Secure Pseudo–Random Bits Generator
Appendix: Sequence of Raga Bageshree for the Generation of TPM and Class Matrix
Chapter 5
Integer Factorization: Can Classical Machines Break the Unbreakable?
5.1. Types of Factorization Problems
5.2. A New Method to Factor Large and Positive Integers From The First Principle
5.2.1. Algorithm 1: Multiplication Subroutine
5.2.2. Algorithm 2: Subtraction Subroutine
5.2.3. Algorithm 3: Division Subroutine
5.2.4. Algorithm 4: Integer Square Root Subroutine
5.3. Discussion
5.3.1. Performance Comparison with Existing Factorization Algorithms
Chapter 6
Why Lightweight Cryptography after All?
6.1. Need for Lightweight Cryptographic Protocols
6.2. How Traditional Cryptographic Algorithms Differ from Lightweight Cryptographic Algorithms
6.3. Existing Symmetric Lightweight Cryptographic Algorithms
6.4. Existing Asymmetric Lightweight Cryptographic Algorithms
6.5. Existing Lightweight Key Exchange Algorithms
6.6. The Future of Lightweight Cryptography and Its Use in Relevant Domains
Chapter 7
Blockchain Technology and the Hype Behind It
7.1. How Blockchains Are Different from Traditional Ledger-Based Structures
7.2. Applications Adopting the Concept of Blockchain Technology
7.3. Hype Around Blockchain Technology and the Reason Behind It
7.4. How Blockchain Technology Is Going to Change the Future of Digital Payments
Chapter 8
Musical Cryptography: An Isolated But Challenging Research Domain
8.1. Securing Voice Communication Using SNC Algorithm
8.1.1. Algorithm: Musical Voice Cryptography
8.2. Empirical Complexity of the Proposed Approach
8.3. Discussion
Chapter 9
Design of a Fuzzy Rule-Based Expert System for Automatic Raga Selection for Cryptographic Applications
9.1. Fuzzy Set and Fuzzy Rule-Based Expert System
9.2. Design of a Fuzzy Rule-Based Expert System for Automatic Raga Selection for Cryptographic Applications
9.3. Discussion
Chapter 10
Conclusion
References
Index
About the Authors
Blank Page
Blank Page




پست ها تصادفی