
Maggiori informazioni sul libro
Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric Symmetric Encryption; Third Epoch of Cryptography: No Key Transport - instead: Derived Keys; Caesura in Cryptography: Juggernaut and Secret Stream Keys; Ciphers Algorithms Multi-Encryption: e.g. McEliece NTRU; Else to know: RNG, MAC, OTP, GNUPG, PKI, Hash, Signatures, GoldBugs, EPKS, SMP; End-to-End Encryption: Instant Perfect Forward Secrecy (IPFS); Cryptographic Calling: e.g. Two-Way-Calling, Repleo, EPKS, AutoCrypt; Volatile Encryption Exponential Encryption; Cryptographic Discovery Cryptographic Tokens; Echo Protocol Graph Theory; POPTASTIC Protocol: Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning Tutorials; Quantum Computing and Cryptography; Frameworks Libraries: e.g. McNoodle McEliece library (C++); Tools: POPTASTIC Delta Chat, Smoke McEliece Java Messenger, et al.; Trends on Crypto Messaging Open Source Cryptography; Encryption of the Hard Disc, Text and Files, P2P Networks; Trusted Execution Environments (TEE) SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions.
Acquisto del libro
Caesura in Cryptography, Evelyn Ackermann
- Lingua
- Pubblicato
- 2020
Metodi di pagamento
Ancora nessuna valutazione.