Muutke küpsiste eelistusi

Stream Ciphers in Modern Real-time IT Systems: Analysis, Design and Comparative Studies 2022 ed. [Pehme köide]

  • Formaat: Paperback / softback, 585 pages, kõrgus x laius: 235x155 mm, kaal: 914 g, 19 Illustrations, color; 120 Illustrations, black and white; XVIII, 585 p. 139 illus., 19 illus. in color., 1 Paperback / softback
  • Sari: Studies in Systems, Decision and Control 375
  • Ilmumisaeg: 20-Nov-2022
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030797724
  • ISBN-13: 9783030797720
Teised raamatud teemal:
  • Pehme köide
  • Hind: 159,88 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 188,09 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 585 pages, kõrgus x laius: 235x155 mm, kaal: 914 g, 19 Illustrations, color; 120 Illustrations, black and white; XVIII, 585 p. 139 illus., 19 illus. in color., 1 Paperback / softback
  • Sari: Studies in Systems, Decision and Control 375
  • Ilmumisaeg: 20-Nov-2022
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030797724
  • ISBN-13: 9783030797720
Teised raamatud teemal:
This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of the volume and stream bit depth of converted data, which makes them the most popular in modern real-time IT systems. 

In particular, we analyze the criteria and performance indicators of algorithms, as well as the principles and methods of designing stream ciphers. Nonlinear-feedback shift registers, which are one of the main elements of stream ciphers, have been studied in detail. 

The book is especially useful for scientists, developers, and experts in the field of cryptology and electronic trust services, as well as for the training of graduate students, masters, and bachelors in the field of information security.

Criteria and indices substantiation of the stream cryptoconversion
efficiency.- Comparison of stream modes in block symmetric
ciphers.- Comparative analysis of determined generators for random bits,
defined in the nist special publication 800-90a.- Analysis of stream
cryptographic transfer algorithms for light (less-resource) cryptographies
defined in iso / iec 29192.- Requirements for feedback coefficients, what
should the m- nlfsr respond to?.- Appendices.