Skip to main content

Understanding Cryptography

From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

  • Textbook
  • © 2024
  • Latest edition

Overview

  • Provides a comprehensive understanding of modern applied cryptography
  • Offers new chapters on SHA-3 and post-quantum cryptography
  • Includes examples, problems, and chapter reviews, as well as an associated website
  • 291 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 59.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 79.99
Price excludes VAT (USA)
This title has not yet been released. You may pre-order it now and we will ship your order when it is published on 16 Jun 2024.
  • Durable hardcover edition
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.

    Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.

    Topics and features:

      • Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest
      • Helps develop a comprehensive understanding of modern applied cryptography
      • Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families
      • Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion
      • Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum
      • Supplies up-to-date security parameters for all cryptographic algorithms
      • Incorporates chapter reviews and discussion on such topics as historical and societal context


      This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers.

      The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.



      Keywords

      Table of contents (14 chapters)

      Authors and Affiliations

      • Max Planck Institute for Security and Privacy, Bochum, Germany

        Christof Paar

      • Hamm-Lippstadt University of Applied Sciences, Hamm, Germany

        Jan Pelzl

      • Ruhr University Bochum, Bochum, Germany

        Tim Güneysu

      About the authors

      The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, from which they have drawn important lessons for their teaching.


      Bibliographic Information

      • Book Title: Understanding Cryptography

      • Book Subtitle: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms

      • Authors: Christof Paar, Jan Pelzl, Tim Güneysu

      • DOI: https://doi.org/10.1007/978-3-662-69007-9

      • Publisher: Springer Berlin, Heidelberg

      • eBook Packages: Computer Science, Computer Science (R0)

      • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer-Verlag GmbH, DE, part of Springer Nature 2024

      • Hardcover ISBN: 978-3-662-69006-2Published: 16 May 2024

      • eBook ISBN: 978-3-662-69007-9Published: 15 May 2024

      • Edition Number: 2

      • Number of Pages: XXI, 543

      • Topics: Cryptology, Systems and Data Security, Quantum Physics, Theory of Computation

      Publish with us