Caesura in Cryptography [Paperback]

About The Book

Within the Learning Material of over 100 open source slides created for Courses Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric & Symmetric Encryption; Third Epoch of Cryptography: No Key Transport - instead: Derived Keys; Caesura in Cryptography: Juggernaut and Secret Stream Keys; Ciphers & Algorithms & Multi-Encryption: e.g. McEliece & NTRU; Else to know: RNG MAC OTP GNUPG PKI Hash Signatures GoldBugs EPKS SMP; End-to-End Encryption: Instant Perfect Forward Secrecy (IPFS); Cryptographic Calling: e.g. Two-Way-Calling Repleo EPKS AutoCrypt; Volatile Encryption & Exponential Encryption; Cryptographic Discovery & Cryptographic Tokens; Echo Protocol & Graph Theory; POPTASTIC Protocol: Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning & Tutorials; Quantum Computing and Cryptography; Frameworks & Libraries: e.g. McNoodle McEliece library (C++); Tools: POPTASTIC Delta Chat Smoke McEliece Java Messenger et al.; Trends on Crypto Messaging & Open Source Cryptography; Encryption of the Hard Disc Text and Files P2P Networks; Trusted Execution Environments (TEE) & SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE