Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric Symmetric Encryption; Third Epoch of Cryptography: No Key Transport - instead: Derived Keys; Caesura in Cryptography: Juggernaut and Secret Stream Keys; Ciphers Algorithms Multi-Encryption: e.g. McEliece NTRU; Else to know: RNG, MAC, OTP, GNUPG, PKI, Hash, Signatures, GoldBugs, EPKS, SMP; End-to-End Encryption: Instant Perfect Forward Secrecy (IPFS); Cryptographic Calling: e.g. Two-Way-Calling, Repleo, EPKS, AutoCrypt; Volatile Encryption Exponential Encryption; Cryptographic Discovery Cryptographic Tokens; Echo Protocol Graph Theory; POPTASTIC Protocol: Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning Tutorials; Quantum Computing and Cryptography; Frameworks Libraries: e.g. McNoodle McEliece library (C++); Tools: POPTASTIC Delta Chat, Smoke McEliece Java Messenger, et al.; Trends on Crypto Messaging Open Source Cryptography; Encryption of the Hard Disc, Text and Files, P2P Networks; Trusted Execution Environments (TEE) SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions.
"synopsis" may belong to another edition of this title.
US$ 52.57 shipping from Germany to U.S.A.
Destination, rates & speedsUS$ 26.87 shipping from Germany to U.S.A.
Destination, rates & speedsSeller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric & Symmetric Encryption; Third Epoch of Cryptography: No Key Transport - instead: Derived Keys; Caesura in Cryptography: Juggernaut and Secret Stream Keys; Ciphers & Algorithms & Multi-Encryption: e.g. McEliece & NTRU; Else to know: RNG, MAC, OTP, GNUPG, PKI, Hash, Signatures, GoldBugs, EPKS, SMP; End-to-End Encryption: Instant Perfect Forward Secrecy (IPFS); Cryptographic Calling: e.g. Two-Way-Calling, Repleo, EPKS, AutoCrypt; Volatile Encryption & Exponential Encryption; Cryptographic Discovery & Cryptographic Tokens; Echo Protocol & Graph Theory; POPTASTIC Protocol: Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning & Tutorials; Quantum Computing and Cryptography; Frameworks & Libraries: e.g. McNoodle McEliece library (C++); Tools: POPTASTIC Delta Chat, Smoke McEliece Java Messenger, et al.; Trends on Crypto Messaging & Open Source Cryptography; Encryption of the Hard Disc, Text and Files, P2P Networks; Trusted Execution Environments (TEE) & SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions. 222 pp. Englisch. Seller Inventory # 9783751989527
Quantity: 2 available
Seller: Buchpark, Trebbin, Germany
Condition: Hervorragend. Zustand: Hervorragend | Seiten: 222 | Sprache: Englisch | Produktart: Bücher. Seller Inventory # 36792150/1
Quantity: 1 available
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric & Symmetric Encryption Third Epoch of Cryptography: No Key Transport - instead: Derived. Seller Inventory # 403644402
Quantity: Over 20 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric & Symmetric Encryption; Third Epoch of Cryptography: No Key Transport - instead: Derived Keys; Caesura in Cryptography: Juggernaut and Secret Stream Keys; Ciphers & Algorithms & Multi-Encryption: e.g. McEliece & NTRU; Else to know: RNG, MAC, OTP, GNUPG, PKI, Hash, Signatures, GoldBugs, EPKS, SMP; End-to-End Encryption: Instant Perfect Forward Secrecy (IPFS); Cryptographic Calling: e.g. Two-Way-Calling, Repleo, EPKS, AutoCrypt; Volatile Encryption & Exponential Encryption; Cryptographic Discovery & Cryptographic Tokens; Echo Protocol & Graph Theory; POPTASTIC Protocol: Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning & Tutorials; Quantum Computing and Cryptography; Frameworks & Libraries: e.g. McNoodle McEliece library (C++); Tools: POPTASTIC Delta Chat, Smoke McEliece Java Messenger, et al.; Trends on Crypto Messaging & Open Source Cryptography; Encryption of the Hard Disc, Text and Files, P2P Networks; Trusted Execution Environments (TEE) & SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions. Seller Inventory # 9783751989527
Quantity: 1 available
Seller: preigu, Osnabrück, Germany
Taschenbuch. Condition: Neu. Caesura in Cryptography | My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University and Leisure. | Evelyn Ackermann (u. a.) | Taschenbuch | Englisch | 2020 | Books on Demand GmbH | EAN 9783751989527 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand. Seller Inventory # 118946297
Quantity: 5 available