Show simple item record

dc.contributor.authorPaar, Christof
dc.contributor.authorPelzl, Jan
dc.date.accessioned2020-05-13T08:23:21Z
dc.date.available2020-05-13T08:23:21Z
dc.date.issued2010
dc.identifier.isbn978-3-642-04101-3
dc.identifier.urihttp://ir.mksu.ac.ke/handle/123456780/6157
dc.description.abstractCryptography has crept into everything, from Web browsers and e-mail programs to cell phones, bank cards, cars and even into medical implants. In the near future we will see many new exciting applications for cryptography such as radio frequency identification (RFID) tags for anti-counterfeiting or car-to-car communications (we’ve worked on securing both of these applications). This is quite a change from the past, where cryptography had been traditionally confined to very specific applications, especially government communications and banking systems. As a consequence of the pervasiveness of crypto algorithms, an increasing number of people must understand how they work and how they can be applied in practice. This book addresses this issue by providing a comprehensive introduction to modern applied cryptography that is equally suited for students and practitioners in industry. Our book provides the reader with a deep understanding of how modern cryptographic schemes work. We introduce the necessary mathematical concepts in a way that is accessible for every reader with a minimum background in college-level calculus. It is thus equally well suited as a textbook for undergraduate or beginning graduate classes, or as a reference book for practicing engineers and computer scientists who are interested in a solid understanding of modern cryptography. The book has many features that make it a unique source for practitioners and students. We focused on practical relevance by introducing most crypto algorithms that are used in modern real-world applications. For every crypto scheme, up-to-date security estimations and key length recommendations are given. We also discuss the important issue of software and hardware implementation for every algorithm. In addition to crypto algorithms, we introduce topics such as important cryptographic protocols, modes of operation, security services and key establishment techniques. Many very timely topics, e.g., lightweight ciphers which are optimized for constrained applications (such as RFID tags or smart cards) or new modes of operations, are also contained in the book.en_US
dc.language.isoen_USen_US
dc.publisherSpringeren_US
dc.titleUnderstanding Cryptographyen_US
dc.title.alternativeA Textbook for Students and Practitionersen_US
dc.typeBooken_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record