US$ 2.64 shipping within U.S.A.
Destination, rates & speedsSeller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition. Seller Inventory # 48086529
Quantity: Over 20 available
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New. Seller Inventory # 48086529-n
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Seller Inventory # 394452984
Quantity: 3 available
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition. Seller Inventory # 48086529
Quantity: Over 20 available
Seller: Grand Eagle Retail, Fairfield, OH, U.S.A.
Hardcover. Condition: new. Hardcover. This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption.FeaturesPresents clear insight to the readers about the various security algorithms and the different mechanisms used for data encryption.Discusses algorithms such as symmetric encryption, asymmetric encryption, digital signatures, and hash functions used for encryption.Covers techniques and methods to optimize the mathematical steps of security algorithms to make those algorithms lightweight, which can be suitable for voice encryption.Illustrates software methods to implement cryptography algorithms.Highlights a comparative analysis of models that are used in implementing cryptography algorithms.The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology. This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data such as asymmetry encryption, digital signatures, and hash functions. It also covers the mathematics behind the use of algorithms for encryption and decryption. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. Seller Inventory # 9781032832845
Quantity: 1 available
Seller: PBShop.store US, Wood Dale, IL, U.S.A.
HRD. Condition: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781032832845
Quantity: Over 20 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 1st edition NO-PA16APR2015-KAP. Seller Inventory # 26401956903
Quantity: 3 available
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 336 pages. 9.18x6.12x9.21 inches. In Stock. This item is printed on demand. Seller Inventory # __1032832843
Quantity: 1 available
Seller: PBShop.store UK, Fairford, GLOS, United Kingdom
HRD. Condition: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. Seller Inventory # L1-9781032832845
Quantity: Over 20 available
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. New copy - Usually dispatched within 4 working days. 453. Seller Inventory # B9781032832845
Quantity: 1 available