Cryptosystem Algorithms A Comprehensive Evaluation
Pandey, Sahadev
Sold by ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
AbeBooks Seller since March 24, 2009
Used - Soft cover
Condition: Used - Good
Ships within U.S.A.
Quantity: 1 available
Add to basketSold by ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
AbeBooks Seller since March 24, 2009
Condition: Used - Good
Quantity: 1 available
Add to basketPages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Seller Inventory # G1770073213I3N00
Cryptosystem Algorithms A Comprehensive Evaluation presents an in-depth investigation into various cryptosystem algorithms. Through rigorous analysis and evaluation, the study delves into the working principles, strengths, weaknesses, and applications of these cryptographic algorithms.
Researchers explore a wide range of algorithms commonly used in modern cryptosystems, including symmetric key algorithms like AES (Advanced Encryption Standard) and DES (Data Encryption Standard), as well as asymmetric key algorithms such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). The paper provides a detailed comparison of these algorithms in terms of their computational efficiency, security levels, and suitability for different use cases.
Furthermore, the study examines the underlying mathematical concepts and cryptographic techniques that form the foundation of these algorithms. It analyzes how each algorithm addresses the critical aspects of data confidentiality, integrity, and authentication, making it invaluable for understanding their real-world implications in securing sensitive information and communications.
The findings of this comprehensive study have far-reaching implications for cybersecurity and data protection. As cyber threats continue to evolve, understanding the intricacies of cryptosystem algorithms becomes increasingly crucial for safeguarding digital assets and ensuring secure communication across various sectors, including finance, healthcare, and government.
Academics, researchers, and professionals in the fields of computer science, cybersecurity, and cryptography will find this research paper to be an essential resource, providing valuable insights and facilitating advancements in the ever-evolving domain of cryptographic algorithms and data security.
"About this title" may belong to another edition of this title.
We guarantee the condition of every book as it's described
on the Abebooks website. If you're dissatisfied with your
purchase (Incorrect Book/Not as Described/Damaged) or if the
order hasn't arrived, you're eligible for a refund within 30
days of the estimated delivery date. If you've changed your
mind about a book that you've ordered, please use the "Ask
bookseller a question link to contact us" and we'll respond
as soon as possible.
All domestic Standard shipments are distributed from our warehouses by OSM, then handed off to the USPS for final delivery.
2-Day Shipping is delivered by FedEx, which does not deliver to PO boxes.
International shipments are tendered to the local postal service in the destination country for final delivery – We do not use courier services for international deliveries.
| Order quantity | 4 to 8 business days | 4 to 8 business days |
|---|---|---|
| First item | US$ 0.00 | US$ 0.00 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.