The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.
After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.
An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography
Shows you how to build cryptography into products from the start
Examines updates and changes to cryptography
Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more
Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.
After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.
An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography
Shows you how to build cryptography into products from the start
Examines updates and changes to cryptography
Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more
Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Note: The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
Note
The book has been read, but looks new. The book cover has no visible wear, and the dust jacket is included if applicable. No missing or damaged pages, no tears, possible very minimal creasing, no underlining or highlighting of text, and no writing in the margins.
People who bought this also bought
[{"item_id":"10599","item_name":"SSL\/TLS Under Lock and Key: A Guide to Understanding SSL\/TLS Cryptography","item_brand":"Hollie Acres, Paul Baka, Jeremy Schatten","item_category":"Computing & Internet","list":"Product Page","price":"10.12","variant":"","quantity":1},{"item_id":"11289","item_name":"Fundamentals of Smart Contract Security - Computer Engineering Foundations, Currents, and Trajectories Collection","item_brand":"Richard Ma, Jan Gorzny, Edward Zulkoski, Kacper Bak, Olga V. Mack","item_category":"Computing & Internet","list":"Product Page","price":"23.90","variant":"","quantity":1},{"item_id":"18009","item_name":"17th WCEAM Proceedings: Sustainable Management of Engineered Assets in a Post-Covid 19 World: Industry 4.0, Digital Transformation, Society 5.0 and Beyond - Lecture Notes in Mechanical Engineering","item_brand":"","item_category":"Science, Technology & Medicine","list":"Product Page","price":"139.99","variant":"","quantity":1},{"item_id":"18057","item_name":"Selected Areas in Cryptography SAC 2025: 32nd International Conference, Toronto, ON, Canada, August 1315, 2025, Revised Selected Papers - Lecture Notes in Computer Science","item_brand":"Christina Boura, Atefeh Mashatan, Ali Miri","item_category":"Computing & Internet","list":"Product Page","price":"48.99","variant":"","quantity":1},{"item_id":"18516","item_name":"Science of Cyber Security - SciSec 2022 Workshops: AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022, Matsue, Japan, August 1012, 2022, Revised Selected Papers - Communications in Computer and Information Science 1680","item_brand":"Chunhua Su, Kouichi Sakurai","item_category":"Computing & Internet","list":"Product Page","price":"45.49","variant":"","quantity":1},{"item_id":"18699","item_name":"The Complete GiveRep Blueprint: Unlocking Reputation, Rewards, and Opportunities in Web3 SocialFi and All You Should Know About it","item_brand":"Angela Ramos","item_category":"Computing & Internet","list":"Product Page","price":"8.31","variant":"","quantity":1},{"item_id":"9954","item_name":"Implementing SSL \/ TLS Using Cryptography and PKI","item_brand":"Joshua Davies","item_category":"Computing & Internet","list":"Product Page","price":"35.00","variant":"","quantity":1},{"item_id":"9311","item_name":"Everyday Cryptography: Fundamental Principles and Applications","item_brand":"Keith Martin","item_category":"Computing & Internet","list":"Product Page","price":"40.60","variant":"","quantity":1}]