Nicht lieferbar
Post-quantum Cryptography - Royce, Taylor
Schade – dieser Artikel ist leider ausverkauft. Sobald wir wissen, ob und wann der Artikel wieder verfügbar ist, informieren wir Sie an dieser Stelle.
  • Broschiertes Buch

A must-read for researchers, professionals, and anybody else interested in cybersecurity in the era of quantum computing is Postquantum Cryptography: Defending Against Quantum Threats. Traditional cryptography techniques could be vulnerable as quantum technology develops. With an emphasis on the newest methods and algorithms created to protect our digital world from the dangers posed by quantum computing, this book provides a thorough examination of the developing topic of postquantum cryptography. Readers will acquire a thorough grasp of quantum-resistant cryptographic techniques, such as…mehr

Andere Kunden interessierten sich auch für
Produktbeschreibung
A must-read for researchers, professionals, and anybody else interested in cybersecurity in the era of quantum computing is Postquantum Cryptography: Defending Against Quantum Threats. Traditional cryptography techniques could be vulnerable as quantum technology develops. With an emphasis on the newest methods and algorithms created to protect our digital world from the dangers posed by quantum computing, this book provides a thorough examination of the developing topic of postquantum cryptography. Readers will acquire a thorough grasp of quantum-resistant cryptographic techniques, such as lattice-based, code-based, and multivariate polynomial encryption, through thorough explanations, real-world examples, and professional insights. Important subjects including NIST's standardization initiatives, the difficulties businesses encounter while implementing postquantum solutions, and the effects of quantum computing on sectors like banking, healthcare, and the Internet of Things (IoT) are also covered in the book. Postquantum Cryptography: Defending Against Quantum Threats offers the information and tactics required to negotiate the changing terrain of digital security, whether you're a developer trying to incorporate quantum-safe algorithms, a cybersecurity expert trying to future-proof your systems, or a company executive getting ready for the quantum era.