SØG - mellem flere end 8 millioner bøger:

Søg på: Titel, forfatter, forlag - gerne i kombination.
Eller blot på isbn, hvis du kender dette.

Viser: What's Cryptology all about?

What's Cryptology all about, 1. udgave
Søgbar e-bog

What's Cryptology all about Vital Source e-bog

Lars Ramkilde Knudsen
(2019)
Polyteknisk Forlag
138,00 kr.
Leveres umiddelbart efter køb
What's Cryptology all about, 1. udgave

What's Cryptology all about Vital Source e-bog

Lars Ramkilde Knudsen
(2019)
Polyteknisk Forlag
91,00 kr.
Leveres umiddelbart efter køb
What's Cryptology all about, 1. udgave

What's Cryptology all about Vital Source e-bog

Lars Ramkilde Knudsen
(2019)
Polyteknisk Forlag
77,00 kr.
Leveres umiddelbart efter køb
What's Cryptology all about?, 1. udgave

What's Cryptology all about?

Lars Ramkilde Knudsen
(2019)
Sprog: Engelsk
Polyteknisk Forlag
169,00 kr.
Flere end 10 stk på lager
Hvor kan jeg afhente varen?
Bestil nu og få den leveret inden for 2-3 hverdage.

Detaljer om varen

  • 1. Udgave
  • Vital Source searchable e-book (Fixed pages)
  • Udgiver: Polyteknisk Forlag (December 2019)
  • ISBN: 9788750200475
In the old days people would meet in person to exchange a secret key which they then could use to exchange secured messages. Today our lives are very different and there is a demand for quick and easy responses. We exchange secret keys every day when we are working on our laptops and smartphones. We encrypt and authenticate messages without noticing it. "What’s Cryptology all about?” explains the basic principles of modern cryptology, how to exchange a common, secret key and how to encrypt a message such that only the intended receiver can read it. It is explained how digital signatures are made today and why cryptographic hash functions are so important in that context. A recent and important application of these hash functions is Bitcoin, Blockchains and cryptocurrencies. It is shown how modern hash functions are constructed. A new chapter is about to be written in the history of cryptology, namely when large quantum computers are built. Such computers will be able to break most of the so-called public-key cryptosystems that are in use today. Luckily there are systems that are (believed to be) safe even in the presences of quantum computers. This book is intended to give the reader a good understanding of what cryptology is all about without giving too many mathematical details.
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: ubegrænset dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 5 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source 365 day rentals (fixed pages)
  • Udgiver: Polyteknisk Forlag (December 2019)
  • ISBN: 9788750200475R365
In the old days people would meet in person to exchange a secret key which they then could use to exchange secured messages. Today our lives are very different and there is a demand for quick and easy responses. We exchange secret keys every day when we are working on our laptops and smartphones. We encrypt and authenticate messages without noticing it. "What’s Cryptology all about?” explains the basic principles of modern cryptology, how to exchange a common, secret key and how to encrypt a message such that only the intended receiver can read it. It is explained how digital signatures are made today and why cryptographic hash functions are so important in that context. A recent and important application of these hash functions is Bitcoin, Blockchains and cryptocurrencies. It is shown how modern hash functions are constructed. A new chapter is about to be written in the history of cryptology, namely when large quantum computers are built. Such computers will be able to break most of the so-called public-key cryptosystems that are in use today. Luckily there are systems that are (believed to be) safe even in the presences of quantum computers. This book is intended to give the reader a good understanding of what cryptology is all about without giving too many mathematical details.
Licens varighed:
Bookshelf online: 5 år fra købsdato.
Bookshelf appen: 5 år fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 5 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • Vital Source 180 day rentals (fixed pages)
  • Udgiver: Polyteknisk Forlag (December 2019)
  • ISBN: 9788750200475R180
In the old days people would meet in person to exchange a secret key which they then could use to exchange secured messages. Today our lives are very different and there is a demand for quick and easy responses. We exchange secret keys every day when we are working on our laptops and smartphones. We encrypt and authenticate messages without noticing it. "What’s Cryptology all about?” explains the basic principles of modern cryptology, how to exchange a common, secret key and how to encrypt a message such that only the intended receiver can read it. It is explained how digital signatures are made today and why cryptographic hash functions are so important in that context. A recent and important application of these hash functions is Bitcoin, Blockchains and cryptocurrencies. It is shown how modern hash functions are constructed. A new chapter is about to be written in the history of cryptology, namely when large quantum computers are built. Such computers will be able to break most of the so-called public-key cryptosystems that are in use today. Luckily there are systems that are (believed to be) safe even in the presences of quantum computers. This book is intended to give the reader a good understanding of what cryptology is all about without giving too many mathematical details.
Licens varighed:
Bookshelf online: 180 dage fra købsdato.
Bookshelf appen: 180 dage fra købsdato.

Udgiveren oplyser at følgende begrænsninger er gældende for dette produkt:
Print: 2 sider kan printes ad gangen
Copy: højest 5 sider i alt kan kopieres (copy/paste)

Detaljer om varen

  • 1. Udgave
  • 75 sider
  • Udgiver: Polyteknisk Forlag (December 2019)
  • ISBN: 9788750200130
In the old days people would meet in person to exchange a secret key which they then could use to exchange secured messages. Today our lives  are very different and there is a demand for quick and easy responses. We exchange secret keys every day when we are working on our laptops and smartphones. We encrypt and authenticate messages without noticing it. "What’s Cryptology all about?” explains the basic principles of modern cryptology, how to exchange a common, secret key and how to encrypt a message such that only the  intended receiver can read it. 
It is explained how digital signatures are made today and why cryptographic hash functions are so important in that context. 
A recent and important application of these hash functions is Bitcoin, Blockchains and cryptocurrencies. It is shown how modern hash functions are constructed.
A new chapter is about to be written in the history of cryptology, namely  when large quantum computers are built. Such computers will be able to break most of the  so-called public-key cryptosystems that are in use today. Luckily there are systems that are  (believed to be) safe even in the presences of quantum computers.
This book is intended to give the reader a good understanding of what cryptology is all about without giving too many mathematical details.  
Contents   1. Introduction  2. Diffie-Hellman key exchange  2.1 Modular arithmetic 2.1.1 Modular exponentiation  3. RSA (Rivest, Shamir, Adleman) 3.1 Prime number generation  4. AES: Advanced Encryption Standard 4.1 Aftermath  5. Hash functions  5.1 The history of cryptographic hash functions  5.2 Iterated hash functions  5.3 SHA-256  5.4 SHA-3  6. Blockchain and crypto currencies  6.1 Payment using cash  6.2 Payment using plastic cards  6.3 Payment with third party 6.3.1 SET  6.4 Chaum’s electronic money  6.5 Blockchain and Bitcoin  6.5.1 Crypto puzzles 6.5.2 Hash chains  6.5.3 Blockchain  6.6 Bitcoin 7. Postquantum cryptology 7.1 Quantum computations 7.2 Quantum resistant systems  7.3 Signatures based on hash functions  7.4 Cryptosystems based on linear codes  7.5 McEliece - public-key encryption  8. Elliptic curves 8.1 Elliptic curve cryptosystems  8.2 Elliptic curve signatures (ECDSA)  8.3 Comparison of discrete logarithms 9. Secret sharing  10. Digital signatures  10.1 Hash functions and digital signatures  10.2 RSA digital signatures  10.3 El-Gamal’s digital signatures  11. MAC  11.1 The security of MAC algorithms 11.2 Iterated MACs  11.3 Practical MAC algorithms  11.3.1 Based on block ciphers  11.3.2 Based on cryptographic hash functions 11.4 Combining authentication and encryption  12. The rest is history 12.1 The AES competition  12.2 The SHA-3 competition
1. Introduction
2. Diffie-Hellman key exchange
2.1 Modular arithmetic
2.1.1 Modular exponentiation
3. RSA (Rivest, Shamir, Adleman)
3.1 Prime number generation
4. AES: Advanced Encryption Standard
4.1 Aftermath
5. Hash functions
5.1 The history of cryptographic hash functions
5.2 Iterated hash functions
5.3 SHA-256
5.4 SHA-3
6. Blockchain and crypto currencies
6.1 Payment using cash
6.2 Payment using plastic cards
6.3 Payment with third party
6.3.1 SET
6.4 Chaum’s electronic money
6.5 Blockchain and Bitcoin
6.5.1 Crypto puzzles
6.5.2 Hash chains
6.5.3 Blockchain
6.6 Bitcoin
7. Postquantum cryptology
7.1 Quantum computations
7.2 Quantum resistant systems
7.3 Signatures based on hash functions
7.4 Cryptosystems based on linear codes
7.5 McEliece - public-key encryption
8. Elliptic curves
8.1 Elliptic curve cryptosystems
8.2 Elliptic curve signatures (ECDSA)
8.3 Comparison of discrete logarithms
9. Secret sharing
10. Digital signatures
10.1 Hash functions and digital signatures
10.2 RSA digital signatures
10.3 El-Gamal’s digital signatures
11. MAC
11.1 The security of MAC algorithms
11.2 Iterated MACs
11.3 Practical MAC algorithms
11.3.1 Based on block ciphers
11.3.2 Based on cryptographic hash functions
11.4 Combining authentication and encryption
12. The rest is history
12.1 The AES competition
12.2 The SHA-3 competition
De oplyste priser er inkl. moms

Polyteknisk Boghandel

har gennem mere end 50 år været studieboghandlen på DTU og en af Danmarks førende specialister i faglitteratur.

 

Vi lagerfører et bredt udvalg af bøger, ikke bare inden for videnskab og teknik, men også f.eks. ledelse, IT og meget andet.

Læs mere her


Trykt eller digital bog?

Ud over trykte bøger tilbyder vi tre forskellige typer af digitale bøger:

 

Vital Source Bookshelf: En velfungerende ebogsplatform, hvor bogen downloades til din computer og/eller mobile enhed.

 

Du skal bruge den gratis Bookshelf software til at læse læse bøgerne - der er indbygget gode værktøjer til f.eks. søgning, overstregning, notetagning mv. I langt de fleste tilfælde vil du samtidig have en sideløbende 1825 dages online adgang. Læs mere om Vital Source bøger

 

Levering: I forbindelse med købet opretter du et login. Når du har installeret Bookshelf softwaren, logger du blot ind og din bog downloades automatisk.

 

 

Adobe ebog: Dette er Adobe DRM ebøger som downloades til din lokale computer eller mobil enhed.

 

For at læse bøgerne kræves særlig software, som understøtter denne type. Softwaren er gratis, men du bør sikre at du har rettigheder til installere software på den maskine du påtænker at anvende den på. Læs mere om Adobe DRM bøger

 

Levering: Et download link sendes pr email umiddelbart efter købet.

 


Ibog: Dette er en online bog som kan læses på udgiverens website. 

Der kræves ikke særlig software, bogen læses i en almindelig browser.

 

Levering: Vores medarbejder sender dig en adgangsnøgle pr email.

 

Vi gør opmærksom på at der ikke er retur/fortrydelsesret på digitale varer.