Computers and the internet forever changed how we communicate messages and other information. They also created new challenges for how we keep that communication private. That is where digital cryptology, the study of secret digital communication, comes in. Learn how professional cryptologists work to outsmart hackers and cyberterrorists trying to access private information. Then try it yourself with a hands-on digital cryptology activity!
More Books:
Language: en
Pages: 32
Pages: 32
Computers and the internet forever changed how we communicate messages and other information. They also created new challenges for how we keep that communication private. That is where digital cryptology, the study of secret digital communication, comes in. Learn how professional cryptologists work to outsmart hackers and cyberterrorists trying to
Language: en
Pages: 453
Pages: 453
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020. The 21 papers presented in this book were carefully reviewed and selected from 49 submissions. The papers are organized in
Language: en
Pages: 435
Pages: 435
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections
Language: en
Pages: 384
Pages: 384
Books about Cryptology For Engineers: An Application-oriented Mathematical Introduction
Language: en
Pages: 340
Pages: 340
Noisy data appear very naturally in applications where the authentication is based on physical identifiers. This book provides a self-contained overview of the techniques and applications of security based on noisy data. It provides a comprehensive overview of the theory of extracting cryptographic keys from noisy data, and describes applications