Cryptography Algorithms - Second Edition

Cryptography Algorithms - Second Edition

Massimo Bertaccini

69,98 €
IVA incluido
Disponible
Editorial:
Packt Publishing
Año de edición:
2024
ISBN:
9781835080030
69,98 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Master real-world cryptography with updated algorithms, enhanced encryption techniques, and modern defenses in this latest edition of Cryptographic AlgorithmsPurchase of the print or Kindle book includes a free eBook in PDF format.Key Features:- Gain expertise in cryptographic algorithms from classical encryption to quantum-resistant security.- Become a forward-thinking cryptographer by diving into next-gen encryption with zero-knowledge proofs, homomorphic encryption, and post-quantum cryptographic techniques.- Analyze vulnerabilities and see how cryptographic algorithms protect against modern cyber threats.Book Description:As cyber threats evolve, so must our cryptographic defenses. This updated edition of Cryptographic Algorithms delves into the latest advancements in encryption, cybersecurity, and data protection, ensuring you stay ahead in this rapidly changing field. Whether you’re an aspiring or seasoned cybersecurity professional, this book equips you with the expertise to confidently tackle modern security challenges.Written by Dr. Massimo Bertaccini-a cryptography researcher, inventor, and cybersecurity expert-this book goes beyond theory, offering real-world applications backed by his inventions and patents. His expertise in zero-knowledge proofs, homomorphic encryption, and blockchain security makes this an essential resource for mastering cryptographic security.With updated algorithms, in-depth explanations, and a comprehensive overview of next-gen cryptographic advancements, this second edition provides the tools to protect sensitive data, implement secure cryptographic systems, and defend against emerging cybersecurity threats.By the end of this book, you’ll have hands-on expertise in modern cryptographic techniques-empowering you to build robust security solutions and stay at the forefront of cybersecurity innovation.What You Will Learn:- Become proficient in key cryptographic algorithms, including AES, RSA, and quantum-resistant encryption- Identify vulnerabilities in symmetric and asymmetric encryption to strengthen security defenses- Apply zero-knowledge protocols to enhance privacy and authentication- Implement homomorphic encryption for secure data processing- Evaluate emerging cryptographic inventions to counter evolving threats- Identify and defend against logical attacks in cryptographic systems- Analyze quantum cryptography through the Shor and Grover algorithmsWho this book is for:This book is for cybersecurity professionals, enthusiasts, and anyone looking to master modern cryptography and advance their cybersecurity career. It covers key cryptographic algorithms, mathematical concepts, and emerging technologies. The book addresses mathematical issues related to the algorithms that may arise. A background in university-level mathematics, algebra, modular arithmetic, finite fields theory, and knowledge of elliptic curves and quantum computing, will help readers get the most out of this book.Table of Contents- Deep Dive into Cryptography- Symmetric Encryption Algorithms- Asymmetric Encryption- Hash Functions and Digital Signature- Zero Knowledge Protocols- New Inventions in Cryptography and Logical Attacks- Elliptic Curves- Introduction to Homomorphic Encryption and Crypto Search Engine- Quantum Cryptography- Quantum Search Algorithms

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
  • Current Trends in Cyber Security
    Irina du Quenoy / Neil Kent
    This groundbreaking collection of essays assesses how cyber security affects our lives, businesses, and safety. The contributors -- all leaders in their fields -- have produced approach cyber security from multiple innovative angles. Business professor Matthew Cadbury takes a long view, studying earlier intelligence failures in the field of conventional conflict to identify pat...
  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey Features- Learn about real-world cryptographic pitfalls and how to avoid them- Understand past attacks on TLS, how these attacks worked, and how they were fixed- Discover the inner workings of modern cryptography and its application within TLS- Purchase of the...
    Disponible

    75,87 €

  • The GPT-4 Crypto Revolution
    Zane Wilder
    Discover the power of AI in the crypto world, from Bitcoin’s disruptive emergence to GPT-4’s cutting-edge analysis. Find out how savvy investors conquer the digital currency frontier. Learn how AI can reshape risk, outsmart markets, and secure your crypto journey. AI Insights: Unravel market trends using GPT-4’s accurate predictions.Strategy Development: Forge robust strategies...
    Disponible

    20,26 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
  • Innovative Machine Learning Applications for Cryptography
    Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pressing concern. The stakes are higher than ever, and the need for innovative solutions to safeguard sensitive information is unden...
    Disponible

    294,49 €

Otros libros del autor

  • Cryptography Algorithms
    Massimo Bertaccini
    Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey Features:Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and new logical attacks on the most-used algorithmsUnderstand the practical implem...
    Disponible

    68,03 €