logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms 2nd Edition by Christof Paar • Jan Pelzl • Tim Güneysu ISBN 9783662690079, 3662690071

  • SKU: EBN-57194776
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

0.0

0 reviews
Instant download (eBook) Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms 2nd Edition after payment.
Authors:Christof Paar • Jan Pelzl • Tim Güneysu
Pages:543 pages.
Year:2024
Editon:2nd
Language:english
File Size:11.39 MB
Format:pdf
ISBNS:9783662690079, 3662690071
Categories: Ebooks

Product desciption

(Ebook) Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms 2nd Edition by Christof Paar • Jan Pelzl • Tim Güneysu ISBN 9783662690079, 3662690071

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.


Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.


Topics and features


Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest

Helps develop a comprehensive understanding of modern applied cryptography

Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families

Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion

Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum

Supplies up-to-date security parameters for all cryptographic algorithms

Incorporates chapter reviews and discussion on such topics as historical and societal context


This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers.


The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products

-20%

(Ebook) Hamlet A2 Graded Reader

$40 $32