Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms (Q6553902)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms |
scientific article; zbMATH DE number 7863702
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms |
scientific article; zbMATH DE number 7863702 |
Statements
Understanding cryptography. From established symmetric and asymmetric ciphers to post-quantum algorithms (English)
0 references
11 June 2024
0 references
cryptography
0 references
cryptanalysis
0 references
symmetric cryptography
0 references
public-key cryptography
0 references
stream ciphers
0 references
block ciphers
0 references
elliptic curve cryptography
0 references
digital signatures
0 references
hash functions
0 references
message authentication codes
0 references
key establishment
0 references
0.8090334534645081
0 references
0.7848656177520752
0 references
0.7831346988677979
0 references
0.7785396575927734
0 references
0.7747631669044495
0 references