Nomenclatura - Encyclopedia of modern Cryptography and Internet Security: From AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys [Paperback]
English


LOOKING TO PLACE A BULK ORDER?CLICK HERE

Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Fast Delivery
Fast Delivery
Sustainably Printed
Sustainably Printed
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.

About The Book

This Encyclopedia of modern Cryptography and Internet Security brings the latest and most relevant coverage of the topic - expanding a lot of relevant terms and central key words: Its a Nomenclatura! # Fundamental information on modern Cryptography and Internet Security in a broadband overview. # Extensive resource with most relevant explanations of keywords and terms. # Introduction article by editing authors on Transformation of Cryptography. # Effective handbook for students tutors and researching professionals in many fields and lecturing and developing experts of all levels to deepen the existing knowledge of the nomenclatura of these topics from Information Theory Applied Mathematics Technological Impact Assessment for sure Linguistic and Computational Methods of Engineering Programming etc.. # Including the didactic game for teaching: Cryptographic Cafeteria. # With bibliographic references to start further readings. # Appearing in an A-Z format Nomenclatura - The Encyclopedia of modern Cryptography and Internet Security provides easy intuitive access to scientific information on all relevant aspects of Cryptography Encryption and Information and Internet Security. This modern Encyclopedia is broad in scope covering everything from AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys including explanations on Authentication Block Ciphers and Stream Ciphers Cryptanalysis and Security Cryptographic Calling and Cryptographic Discovery Cryptographic Protocols like e.g. the Echo-Protocol Elliptic Curve Cryptography Fiasco Forwarding Goldbugs Hash Functions and MACs Juggling Juggernauts and Juggerknot Keys McEliece Multi-Encryption NTRU OTM Public Key Cryptography Patch-Points POPTASTIC Quantum Computing Cryptography Secret Streams Turtle Hopping Two-Way-Calling and many more... This introducing and cross-linking reference has been published in two popular formats: print and as eBook. The printed book edition
downArrow

Details