Practical cryptography: algorithms and implementations using C++
Many books are available on the subject of cryptography. Most of these books focus on only the theoretical aspects of cryptography. Some books that include cryptographic algorithms with practical programming codes are by this time (i.e., at the preparation of this book) outdated. Though cryptography...
| Other Authors: | Azad, Saiful |
|---|---|
| Format: | Book |
| Language: | English English |
| Published: |
CRC Press, Taylor & Francis Group, USA
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/39382/ http://irep.iium.edu.my/39382/1/CoverPage_PracticalCrypt.pdf http://irep.iium.edu.my/39382/2/Front_matters.pdf |
Similar Items
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019)
by: Ali, Mohammed Ahnaf
Published: (2019)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017)
by: Lew , Chee Hon
Published: (2017)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
CSC 535 � CRYPTOGRAPHY FEB 99.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1999)
CCS523 – COMPUTER SECURITY AND CRYPTOGRAPHY NOV 2010
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2010)
CCS523- COMPUTER SECURITY AND CRYPTOGRAPHY JANUARI 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
Improved handover decision algorithm using multiple criteria
by: Mohamed Abdullah, Radhwan, et al.
Published: (2018)
by: Mohamed Abdullah, Radhwan, et al.
Published: (2018)
Fuzzy modeling using Bat Algorithm optimization for classification
by: Noor Amidah, Ahmad Sultan
Published: (2018)
by: Noor Amidah, Ahmad Sultan
Published: (2018)
An Approach to Derive Parametric L-System Using Genetic Algorithm
by: Farooq, H., et al.
Published: (2009)
by: Farooq, H., et al.
Published: (2009)
A Multidimensional Search Space Using Interactive Genetic Algorithm
by: Farooq, H., et al.
Published: (2010)
by: Farooq, H., et al.
Published: (2010)
CCS528 – Information Security And
Cryptography
(Keselamatan Maklumat Dan
Kriptografi
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CCS528 – Information Security and Cryptography
(Keselamatan Maklumat dan Kriptografi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
New Representation Method For Integers And Its Application On Elliptic Curve Cryptography
by: Eghdamian, Arash
Published: (2020)
by: Eghdamian, Arash
Published: (2020)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Manufacturing process re-engineering design implementation using computer simulation model
by: Wirabhuana, Arya
Published: (2006)
by: Wirabhuana, Arya
Published: (2006)
Alzheimer's diseases detection by using deep learning algorithms: a mini-review
by: Al-Shoukry, Suhad, et al.
Published: (2020)
by: Al-Shoukry, Suhad, et al.
Published: (2020)
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
by: Milad , Miri
Published: (2018)
by: Milad , Miri
Published: (2018)
Implementing traffic conditioner using token bucket and leaky bucket / Chia Kai Yan
by: Chia , Kai Yan
Published: (2004)
by: Chia , Kai Yan
Published: (2004)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
by: Alawida, Moatsum Khalif Oduh
Published: (2020)
Chaotification Methods For
Enhancing One-Dimension Digital
Chaotic Maps For Applications In
Cryptography
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
by: Alawida, Moatsum Khalif Oduh
Published: (2022)
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Automatic timetabling for Malaysian secondary school using genetic algorithm / Ku Shin Soon
by: Ku, Shin Soon
Published: (2006)
by: Ku, Shin Soon
Published: (2006)
MapReduce algorithm for weather dataset
by: Majid, Mazlina A., et al.
Published: (2018)
by: Majid, Mazlina A., et al.
Published: (2018)
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
by: Alamri, Hammoudeh S., et al.
Published: (2019)
Implementation traffic control and traffic shaping in linux using web approach / Eric Ng Kang Yin
by: Eric Ng, Kang Yin
Published: (2004)
by: Eric Ng, Kang Yin
Published: (2004)
10 c’s of social networking, interconnections and
the impact on social networking
by: Shah, Asadullah, et al.
Published: (2013)
by: Shah, Asadullah, et al.
Published: (2013)
The Role of Factors in Business-to-Business E-Procurement Implementation
by: Naseebullah, M., et al.
Published: (2010)
by: Naseebullah, M., et al.
Published: (2010)
Implementation of case-based reasoning in help desk system
by: Tee, Shih Min
Published: (2019)
by: Tee, Shih Min
Published: (2019)
Implementation of a MIS tool based on open XML
by: Baniani, Behdad
Published: (2009)
by: Baniani, Behdad
Published: (2009)
Spot IT internal intranet website / Rekha Nair C.Gamgadharan Nair
by: Rekha Nair , C.Gamgadharan Nair
Published: (2002)
by: Rekha Nair , C.Gamgadharan Nair
Published: (2002)
Multimedia training package on C# programming language / Johriah Norfizlina Ismail
by: Johriah Norfizlina, Ismail
Published: (2002)
by: Johriah Norfizlina, Ismail
Published: (2002)
Improvements Over Two Phase Shortest Path Algorithm
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
An Effective Fast Searching Algorithm for Internet Crawling Usage
by: Chia, Zhen Hon, et al.
Published: (2016)
by: Chia, Zhen Hon, et al.
Published: (2016)
Implementation of RIO in UMJaNetSim / Chan Chin We
by: Chan, Chin We
Published: (2004)
by: Chan, Chin We
Published: (2004)
Features Selection in the Proposed Draft Sheet C1 for General Elections in
Indonesia
by: Erin, Efriansyah, et al.
Published: (2023)
by: Erin, Efriansyah, et al.
Published: (2023)
Sistem pemilihan contoh pengaturcaraan C(S2PC) / Mohd Zulkhairi Bahari
by: Mohd Zulkhairi, Bahari
Published: (2003)
by: Mohd Zulkhairi, Bahari
Published: (2003)
C programming tutoring simulation with interactive multimedia "cyberc" / Goh Lee Ching
by: Goh , Lee Ching
Published: (2004)
by: Goh , Lee Ching
Published: (2004)
Efficient skyline processing algorithm over dynamic and incomplete database
by: Babanejad, Ghazaleh, et al.
Published: (2018)
by: Babanejad, Ghazaleh, et al.
Published: (2018)
Similar Items
-
Implementation of hashed cryptography algorithm based on cryptography message syntax
by: Ali, Mohammed Ahnaf
Published: (2019) -
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013) -
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
by: Lew , Chee Hon
Published: (2017) -
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014) -
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)