Cryptography algorithms: A guide to algorithms in blockchain quantum cryptography zero knowledge protocols and homorphic encryption / Massimo Bertaccini.
Material type:
TextPublication details: Birmingham: Packt; c2022.Description: xvi, 340p.: ill.; 24cmISBN: - 9781789617139
- QA76.9.A25 .B47 2022
Contents:
Deep Diving into Cryptography -- Introduction to Symmetric Encryption -- Asymmetric Encryption -- Introducing Hash Functions and Digital Signatures --Introduction to Zero-Knowledge Protocols -- New Algorithms in Public/Private Key Cryptography - Elliptic Curves -- Quantum Cryptography-- Crypto Search Engine.
| Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|---|
Books
|
Zetech Library - Mang'u Campus General Stacks | Non-fiction | QA76.9.A25 .B47 2022 (Browse shelf(Opens below)) | C1 | Available | Z011535 | |
Books
|
Zetech Library - Ruiru Campus General Stacks | Non-fiction | QA76.9.A25 .B47 2022 (Browse shelf(Opens below)) | C2 | Available | Z011536 |
Browsing Zetech Library - Mang'u Campus shelves, Shelving location: General Stacks, Collection: Non-fiction Close shelf browser (Hides shelf browser)
|
|
|
|
|
No cover image available No cover image available |
|
||
| QA76.774.A53 .H67 2021 Android programming for beginners: Build in-depth, full-featured android apps starting from zero programming experience / | QA76.774.A53 .H67 2021 Android programming for beginners: Build in-depth, full-featured android apps starting from zero programming experience / | QA76.8.I292 .T75 2014 The 8088 and 8086 microprocessors programming ,interfacing , hardware / | QA76.9.A25 .B47 2022 Cryptography algorithms: A guide to algorithms in blockchain quantum cryptography zero knowledge protocols and homorphic encryption / | QA76.9.A25 .E27 2023 Computer security fundamentals / | QA76.9.A43 .A76 2022 Analysis and design of algorithms / | QA76.9.A43 .L37 2021 Advanced Algorithms and data structures/ |
Deep Diving into Cryptography -- Introduction to Symmetric Encryption -- Asymmetric Encryption -- Introducing Hash Functions and Digital Signatures --Introduction to Zero-Knowledge Protocols -- New Algorithms in Public/Private Key Cryptography - Elliptic Curves -- Quantum Cryptography-- Crypto Search Engine.
There are no comments on this title.
Log in to your account to post a comment.
