ABSTRACT

A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author's teaching notes and research publications, the text is des

chapter 1|8 pages

Introduction

chapter 2|16 pages

Symmetric-Key Cryptography

chapter 4|34 pages

Symmetric-Key Cryptography: Stream Ciphers

chapter 5|112 pages

Symmetric-Key Cryptography: Block Ciphers

chapter 6|28 pages

Public-Key Cryptography

chapter 7|90 pages

Public-Key Cryptography: RSA

chapter 9|42 pages

Public-Key Cryptography: Elliptic Curves

chapter 10|100 pages

Cryptographic Components

chapter 11|58 pages

Cryptographic Protocols