Cryptography algorithms : explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography
Description
More Details
Notes
Subjects
Also in this Series
Reviews from GoodReads
Citations
Bertaccini, M. (2024). Cryptography algorithms: explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography (Second edition.). Packt Publishing Ltd..
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Bertaccini, Massimo. 2024. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography. Birmingham, UK: Packt Publishing Ltd.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Bertaccini, Massimo. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography Birmingham, UK: Packt Publishing Ltd, 2024.
Harvard Citation (style guide)Bertaccini, M. (2024). Cryptography algorithms: explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography. Second edn. Birmingham, UK: Packt Publishing Ltd.
MLA Citation, 9th Edition (style guide)Bertaccini, Massimo. Cryptography Algorithms: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography Second edition., Packt Publishing Ltd., 2024.
Staff View
Grouping Information
Grouped Work ID | 9dc27505-3113-8450-d1d0-4fe969530883-eng |
---|---|
Full title | cryptography algorithms explore new algorithms in zero knowledge homomorphic encryption and quantum cryptography |
Author | bertaccini massimo |
Grouping Category | book |
Last Update | 2025-01-24 12:33:29PM |
Last Indexed | 2025-02-27 03:31:17AM |
Book Cover Information
Image Source | default |
---|---|
First Loaded | Feb 6, 2025 |
Last Used | Feb 6, 2025 |
Marc Record
First Detected | Dec 16, 2024 11:30:28 PM |
---|---|
Last File Modification Time | Dec 17, 2024 08:39:29 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 05864cam a22005057i 4500 | ||
---|---|---|---|
001 | on1452741462 | ||
003 | OCoLC | ||
005 | 20241217082840.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 240820s2024 enka ob 001 0 eng d | ||
019 | |a 1451795990 | ||
020 | |a 9781835087978 | ||
020 | |a 1835087973 | ||
035 | |a (OCoLC)1452741462|z (OCoLC)1451795990 | ||
037 | |a 9781835080030|b O'Reilly Media | ||
040 | |a ORMDA|b eng|e rda|e pn|c ORMDA|d OCLCO|d EBLCP|d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a QA268 | |
082 | 0 | 4 | |a 005.8/24|2 23/eng/20240820 |
100 | 1 | |a Bertaccini, Massimo,|e author. | |
245 | 1 | 0 | |a Cryptography algorithms :|b explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography /|c Massimo Bertaccini. |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK :|b Packt Publishing Ltd.,|c 2024. | |
300 | |a 1 online resource (410 pages) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
490 | 1 | |a Expert insight | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: A Brief History and Outline of Cryptography -- Chapter 1: Deep Dive into Cryptography -- An introduction to cryptography -- Binary numbers, ASCII code, and notations -- Fermat's Last Theorem, prime numbers, and modular mathematics -- A brief history and a panoramic overview of cryptographic algorithms -- Rosetta Stone -- The Caesar cipher -- ROT13 -- The Beale ciphers -- The Vernam cipher -- Notes on security and computation -- Summary -- Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption) | |
505 | 8 | |a Chapter 2: Symmetric Encryption Algorithms -- Notations and operations in Boolean logic -- DES algorithms -- Simple DES -- Bit initialization -- Bit expansion -- Key generation -- Bit encryption -- DES -- Key generation in DES -- Analysis of the DES algorithm -- Violation of DES -- Triple DES -- DESX -- AES Rijndael -- Description of AES -- Attacks and vulnerabilities in AES -- Summary -- Chapter 3: Asymmetric Encryption Algorithms -- Introduction to asymmetric encryption -- The pioneers -- The Diffie-Hellman algorithm -- The discrete logarithm -- Explaining the D-H algorithm | |
505 | 8 | |a Analyzing the algorithm -- Possible attacks and cryptanalysis on the D-H algorithm -- RSA -- Explaining RSA -- Analyzing RSA -- Conventional attacks on the algorithm -- The application of RSA to verify international treaties -- Unconventional attacks -- PGP -- The ElGamal algorithm -- Summary -- Chapter 4: Hash Functions and Digital Signatures -- A basic explanation of hash functions -- Overview of the main hash algorithms -- Logic and notations to implement hash functions -- Explanation of the SHA-1 algorithm -- Notes and example on SHA-1 -- Example of one block encoded with SHA- 1 | |
505 | 8 | |a Authentication and digital signatures -- RSA digital signatures -- Why do digital signatures work? -- Digital signatures with the ElGamal algorithm -- Blind signatures -- Blind signature with RSA -- Notes on the blind signature protocol -- Summary -- Section 3: New Cryptography Algorithms and Protocols -- Chapter 5: Zero-Knowledge Protocols -- The main scenario of a ZKP -- the digital cave -- Non-interactive ZKPs -- Demonstration of a non-interactive ZKP -- Demonstrating an attack on an RSA ZKP -- Schnorr's interactive ZKP -- A demonstration of an interactive ZKP | |
505 | 8 | |a A challenge for a disruptive attack on an interactive ZKP -- One-round ZKP -- How it works mathematically -- Numerical example -- Notes on the one-round protocol -- An introduction to zk-SNARKs -- spooky moon math -- Understanding how a zk-SNARK works -- Demonstrating an attack on a zk-SNARK protocol -- ZK13 -- a ZKP for authentication and key exchange -- ZK13 explained -- Demonstrating the ZK13 protocol -- Notes and possible attacks on the ZK13 protocol -- Possible attacks on ZK13 -- Summary -- Chapter 6: New Inventions in Cryptography and Logical Attacks | |
520 | |a This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today's cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise. | ||
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Cryptography.|9 35279 | |
650 | 0 | |a Computer security.|9 65527 | |
776 | 0 | 8 | |i Print version:|a Bertaccini, Massimo|t Cryptography Algorithms|d Birmingham : Packt Publishing, Limited,c2024|z 9781835080030 |
830 | 0 | |a Expert insight. | |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781835080030/?ar|x O'Reilly|z eBook |
938 | |a ProQuest Ebook Central|b EBLB|n EBL31591424 | ||
994 | |a 92|b VIA | ||
999 | |c 361236|d 361236 |