Readings Newsletter
Become a Readings Member to make your shopping experience even easier.
Sign in or sign up for free!
You’re not far away from qualifying for FREE standard shipping within Australia
You’ve qualified for FREE standard shipping within Australia
The cart is loading…
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
"Encryption Demystified The Key to Securing Your Digital Life" is a comprehensive coursebook that discusses the fundamental principles of encryption, its applications in various contexts, and emerging technologies that rely on encryption to maintain security and privacy.
The book covers a range of topics, including symmetric and asymmetric encryption, key management, digital signatures, perfect forward secrecy, quantum-resistant encryption, encryption standards, and regulations that ensure the protection of sensitive information.
The book also examines emerging technologies such as blockchain and the Internet of Things (IoT) and their unique challenges and opportunities in the context of encryption. It provides a detailed examination of the current state of post-quantum cryptography research, including lattice-based cryptography, code-based cryptography, hash-based cryptography, and multivariate isogeny-based cryptography, and the ongoing effort to standardize post-quantum algorithms.
The book examines the challenges and limitations of post-quantum cryptography, including the trade-offs between security and efficiency, the need for new hardware, and the potential for side-channel attacks. It provides a comprehensive overview of different types of side channel attacks, including power analysis, electromagnetic analysis, and acoustic cryptanalysis attacks, and how to protect against them.
This book is designed for students and professionals interested in cryptography and its applications in various contexts. The book provides a solid foundation in encryption and its applications, preparing readers for the challenges of securing our digital world.
$9.00 standard shipping within Australia
FREE standard shipping within Australia for orders over $100.00
Express & International shipping calculated at checkout
This title is printed to order. This book may have been self-published. If so, we cannot guarantee the quality of the content. In the main most books will have gone through the editing process however some may not. We therefore suggest that you be aware of this before ordering this book. If in doubt check either the author or publisher’s details as we are unable to accept any returns unless they are faulty. Please contact us if you have any questions.
"Encryption Demystified The Key to Securing Your Digital Life" is a comprehensive coursebook that discusses the fundamental principles of encryption, its applications in various contexts, and emerging technologies that rely on encryption to maintain security and privacy.
The book covers a range of topics, including symmetric and asymmetric encryption, key management, digital signatures, perfect forward secrecy, quantum-resistant encryption, encryption standards, and regulations that ensure the protection of sensitive information.
The book also examines emerging technologies such as blockchain and the Internet of Things (IoT) and their unique challenges and opportunities in the context of encryption. It provides a detailed examination of the current state of post-quantum cryptography research, including lattice-based cryptography, code-based cryptography, hash-based cryptography, and multivariate isogeny-based cryptography, and the ongoing effort to standardize post-quantum algorithms.
The book examines the challenges and limitations of post-quantum cryptography, including the trade-offs between security and efficiency, the need for new hardware, and the potential for side-channel attacks. It provides a comprehensive overview of different types of side channel attacks, including power analysis, electromagnetic analysis, and acoustic cryptanalysis attacks, and how to protect against them.
This book is designed for students and professionals interested in cryptography and its applications in various contexts. The book provides a solid foundation in encryption and its applications, preparing readers for the challenges of securing our digital world.