Cryptography Recent Advances and Future Developments
Despite being 2000 years old, cryptography is still a very active field of research. New needs and application fields, like privacy, the Internet of Things (IoT), physically unclonable functions (PUFs), post-quantum cryptography, and quantum key distribution, will keep fueling the work in this field...
Saved in:
Other Authors: | |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IntechOpen
2021
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000naaaa2200000uu 4500 | ||
---|---|---|---|
001 | doab_20_500_12854_131224 | ||
005 | 20231201 | ||
003 | oapen | ||
006 | m o d | ||
007 | cr|mn|---annan | ||
008 | 20231201s2021 xx |||||o ||| 0|eng d | ||
020 | |a intechopen.87684 | ||
020 | |a 9781839625664 | ||
020 | |a 9781839625657 | ||
020 | |a 9781839625886 | ||
040 | |a oapen |c oapen | ||
024 | 7 | |a 10.5772/intechopen.87684 |c doi | |
041 | 0 | |a eng | |
042 | |a dc | ||
072 | 7 | |a UTN |2 bicssc | |
100 | 1 | |a Bernardini, Riccardo |4 edt | |
700 | 1 | |a Bernardini, Riccardo |4 oth | |
245 | 1 | 0 | |a Cryptography |b Recent Advances and Future Developments |
260 | |b IntechOpen |c 2021 | ||
300 | |a 1 electronic resource (152 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
506 | 0 | |a Open Access |2 star |f Unrestricted online access | |
520 | |a Despite being 2000 years old, cryptography is still a very active field of research. New needs and application fields, like privacy, the Internet of Things (IoT), physically unclonable functions (PUFs), post-quantum cryptography, and quantum key distribution, will keep fueling the work in this field. This book discusses quantum cryptography, lightweight cryptography for IoT, PUFs, cryptanalysis, and more. It provides a snapshot of some recent research results in the field, providing readers with some useful tools and stimulating new ideas and applications for future investigation. | ||
540 | |a Creative Commons |f https://creativecommons.org/licenses/by/3.0/ |2 cc |4 https://creativecommons.org/licenses/by/3.0/ | ||
546 | |a English | ||
650 | 7 | |a Network security |2 bicssc | |
653 | |a security, cybersecurity, privacy, authentication, protocols | ||
856 | 4 | 0 | |a www.oapen.org |u https://mts.intechopen.com/storage/books/9875/authors_book/authors_book.pdf |7 0 |z DOAB: download the publication |
856 | 4 | 0 | |a www.oapen.org |u https://directory.doabooks.org/handle/20.500.12854/131224 |7 0 |z DOAB: description of the publication |