منذ 7 ساعات
The book begins with an exploration of many of the key cryptographic
primitives, including basic algorithms like block ciphers, public encryption
schemes, hash functions, and random number generators. Each chapter
provides working examples of how the algorithms work and what you should
or should not do. Final chapters cover advanced subjects such as TLS, as well
as the future of cryptography—what to do after quantum computers arrive
to complicate our lives.
primitives, including basic algorithms like block ciphers, public encryption
schemes, hash functions, and random number generators. Each chapter
provides working examples of how the algorithms work and what you should
or should not do. Final chapters cover advanced subjects such as TLS, as well
as the future of cryptography—what to do after quantum computers arrive
to complicate our lives.

