An Introduction to Secret Sharing

Download An Introduction to Secret Sharing PDF Online Free

Author :
Publisher : Springer Nature
ISBN 13 : 3031281616
Total Pages : 81 pages
Book Rating : 4.0/5 (312 download)

DOWNLOAD NOW!


Book Synopsis An Introduction to Secret Sharing by : Stephan Krenn

Download or read book An Introduction to Secret Sharing written by Stephan Krenn and published by Springer Nature. This book was released on 2023-05-25 with total page 81 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.

Secure Multiparty Computation

Download Secure Multiparty Computation PDF Online Free

Author :
Publisher : Cambridge University Press
ISBN 13 : 1107043050
Total Pages : 385 pages
Book Rating : 4.1/5 (7 download)

DOWNLOAD NOW!


Book Synopsis Secure Multiparty Computation by : Ronald Cramer

Download or read book Secure Multiparty Computation written by Ronald Cramer and published by Cambridge University Press. This book was released on 2015-07-15 with total page 385 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.

Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory

Download Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory PDF Online Free

Author :
Publisher : World Scientific
ISBN 13 : 9811248346
Total Pages : 215 pages
Book Rating : 4.8/5 (112 download)

DOWNLOAD NOW!


Book Synopsis Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory by : Patrick Sole

Download or read book Code Based Secret Sharing Schemes: Applied Combinatorial Coding Theory written by Patrick Sole and published by World Scientific. This book was released on 2022-04-11 with total page 215 pages. Available in PDF, EPUB and Kindle. Book excerpt: Secret sharing schemes form one of the most important topic in Cryptography. These protocols are used in many areas, applied mathematics, computer science, electrical engineering. A secret is divided into several pieces called shares. Each share is given to a user of the system. Each user has no information about the secret, but the secret can be retrieved by certain authorized coalition of users.This book is devoted to such schemes inspired by Coding Theory. The classical schemes of Shamir, Blakley, Massey are recalled. Survey is made of research in Combinatorial Coding Theory they triggered, mostly self-dual codes, and minimal codes. Applications to engineering like image processing, and key management of MANETs are highlighted.

Visual Cryptography and Secret Image Sharing

Download Visual Cryptography and Secret Image Sharing PDF Online Free

Author :
Publisher : CRC Press
ISBN 13 : 1439837228
Total Pages : 533 pages
Book Rating : 4.4/5 (398 download)

DOWNLOAD NOW!


Book Synopsis Visual Cryptography and Secret Image Sharing by : Stelvio Cimato

Download or read book Visual Cryptography and Secret Image Sharing written by Stelvio Cimato and published by CRC Press. This book was released on 2017-12-19 with total page 533 pages. Available in PDF, EPUB and Kindle. Book excerpt: With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure dissemination of sensitive information. Image data protection and image-based authentication techniques offer efficient solutions for controlling how private data and images are made available only to select people. Essential to the design of systems used to manage images that contain sensitive data—such as medical records, financial transactions, and electronic voting systems—the methods presented in this book are useful to counter traditional encryption techniques, which do not scale well and are less efficient when applied directly to image files. An exploration of the most prominent topics in digital imaging security, this book discusses: Potential for sharing multiple secrets Visual cryptography schemes—based either on the probabilistic reconstruction of the secret image, or on different logical operations for combining shared images Inclusion of pictures in the distributed shares Contrast enhancement techniques Color-image visual cryptography Cheating prevention Alignment problems for image shares Steganography and authentication In the continually evolving world of secure image sharing, a growing number of people are becoming involved as new applications and business models are being developed all the time. This contributed volume gives academicians, researchers, and professionals the insight of well-known experts on key concepts, issues, trends, and technologies in this emerging field.

A Pragmatic Introduction to Secure Multi-Party Computation

Download A Pragmatic Introduction to Secure Multi-Party Computation PDF Online Free

Author :
Publisher : Foundations and Trends (R) in Privacy and Security
ISBN 13 : 9781680835083
Total Pages : 190 pages
Book Rating : 4.8/5 (35 download)

DOWNLOAD NOW!


Book Synopsis A Pragmatic Introduction to Secure Multi-Party Computation by : David Evans

Download or read book A Pragmatic Introduction to Secure Multi-Party Computation written by David Evans and published by Foundations and Trends (R) in Privacy and Security. This book was released on 2018-12-19 with total page 190 pages. Available in PDF, EPUB and Kindle. Book excerpt: Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems or conduct further research will find this essential reading.

Advances in Cryptology — CRYPTO ’93

Download Advances in Cryptology — CRYPTO ’93 PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3540483292
Total Pages : 502 pages
Book Rating : 4.5/5 (44 download)

DOWNLOAD NOW!


Book Synopsis Advances in Cryptology — CRYPTO ’93 by : Douglas R. Stinson

Download or read book Advances in Cryptology — CRYPTO ’93 written by Douglas R. Stinson and published by Springer. This book was released on 2003-05-15 with total page 502 pages. Available in PDF, EPUB and Kindle. Book excerpt: The CRYPTO ’93 conference was sponsored by the International Association for Cryptologic Research (IACR) and Bell-Northern Research (a subsidiary of Northern Telecom), in co-operation with the IEEE Computer Society Technical Committee. It took place at the University of California, Santa Barbara, from August 22-26, 1993. This was the thirteenth annual CRYPTO conference, all of which have been held at UCSB. The conference was very enjoyable and ran very of the General Chair, Paul Van Oorschot. smoothly, largely due to the efforts It was a pleasure working with Paul throughout the months leading up to the conference. There were 136 submitted papers which were considered by the Program Committee. Of these, 38 were selected for presentation at the conference. There was also one invited talk at the conference, presented by Miles Smid, the title of which was “A Status Report On the Federal Government Key Escrow System.” The conference also included the customary Rump Session, which was presided over by Whit Diffie in his usual inimitable fashion. Thanks again to Whit for organizing and running the Rump session. This year, the Rump Session included an interesting and lively panel discussion on issues pertaining to key escrowing. Those taking part were W. Diffie, J. Gilmore, S. Goldwasser, M. Hellman, A. Herzberg, S. Micali, R. Rueppel, G. Simmons and D. Weitzner.

On Foundations of Public-key Encryption and Secret Sharing

Download On Foundations of Public-key Encryption and Secret Sharing PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : 166 pages
Book Rating : 4.:/5 (114 download)

DOWNLOAD NOW!


Book Synopsis On Foundations of Public-key Encryption and Secret Sharing by : Akshay Dhananjai Degwekar

Download or read book On Foundations of Public-key Encryption and Secret Sharing written by Akshay Dhananjai Degwekar and published by . This book was released on 2019 with total page 166 pages. Available in PDF, EPUB and Kindle. Book excerpt: Since the inception of Cryptography, Information theory and Coding theory have influenced cryptography in myriad ways including numerous information-theoretic notions of security in secret sharing, multiparty computation and statistical zero knowledge; and by providing a large toolbox used extensively in cryptography. This thesis addresses two questions in this realm: Leakage Resilience of Secret Sharing Schemes. We show that classical secret sharing schemes like Shamir secret sharing and additive secret sharing over prime order fields are leakage resilient. Leakage resilience of secret sharing schemes is closely related to locally repairable codes and our results can be viewed as impossibility results for local recovery over prime order fields. As an application of the result, we show the leakage resilience of a variant of the Goldreich-Micali-Wigderson protocol. From Laconic Statistical Zero Knowledge Proofs to Public Key Encryption. Languages with statistical zero knowledge proofs that are also average-case hard have been used to construct various cryptographic primitives. We show that hard languages with laconic SZK proofs, that is proof systems where the communication from the prover to the verifier is small, imply public key encryption.

Coding and Cryptology

Download Coding and Cryptology PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3642209017
Total Pages : 302 pages
Book Rating : 4.6/5 (422 download)

DOWNLOAD NOW!


Book Synopsis Coding and Cryptology by : Yeow Meng Chee

Download or read book Coding and Cryptology written by Yeow Meng Chee and published by Springer. This book was released on 2011-06-05 with total page 302 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Secret-sharing Schemes and Conditional Disclosure of Secrets Protocols

Download Secret-sharing Schemes and Conditional Disclosure of Secrets Protocols PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.:/5 (128 download)

DOWNLOAD NOW!


Book Synopsis Secret-sharing Schemes and Conditional Disclosure of Secrets Protocols by : Naty Peter

Download or read book Secret-sharing Schemes and Conditional Disclosure of Secrets Protocols written by Naty Peter and published by . This book was released on 2020 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt: "In this thesis we study a cryptographic primitive called secret-sharing schemes. A secret-sharing scheme is a method by which a dealer, holding a secret string, distributes shares to parties such that only authorized subsets of parties can reconstruct the secret from their shares. The collection of authorized subsets is called an access structure. Secret-sharing schemes are an important tool in cryptography, and they are used as a building-box in many secure protocols, such as secure multiparty computation protocols, threshold cryptography, access control, attribute-based encryption, and generalized oblivious transfer protocols. A secret-sharing scheme is linear if the shares are generated using a linear function. It is important to construct linear secret-sharing schemes, since in many of the applications of secret-sharing schemes it is required that the scheme is linear." -- From the abstract.

The Incomplete History of Secret Organizations

Download The Incomplete History of Secret Organizations PDF Online Free

Author :
Publisher : Hachette Books
ISBN 13 : 0316451835
Total Pages : 216 pages
Book Rating : 4.3/5 (164 download)

DOWNLOAD NOW!


Book Synopsis The Incomplete History of Secret Organizations by : Joe Tracz

Download or read book The Incomplete History of Secret Organizations written by Joe Tracz and published by Hachette Books. This book was released on 2018-10-30 with total page 216 pages. Available in PDF, EPUB and Kindle. Book excerpt: This mysterious illustrated tie-in to Netflix's award-winning A Series of Unfortunate Events -- featuring an introduction by Count Olaf's legal representative, Neil Patrick Harris -- shares insider secrets about the Baudelaire family and the making of the show. In every library there is a single book that can answer the question that burns like a fire in the mind... In this collector's companion you will discover never-before-seen photographs, never-before-told stories, and never-before, revealed secrets spanning all three seasons of the hilariously twisted, critically acclaimed hit series. You will encounter original concept art, annotated script excerpts, and interviews with the creative team and all-star cast, as well as glossaries, recipes, lyric sheets, hidden Easter eggs, shocking backstories, and suspicious pages from the titular tome, unredacted, and revealed here for the first time. Featuring interviews with: Tony Hale Daniel Handler Aasif Mandvi Sara Rue Barry Sonnenfeld Patrick Warburton Bo Welch Alfre Woodard and more... Perhaps you are wondering how a noble person such as yourself might become a member of a secret organization. Like so many things in life, it starts by picking up the right book. So go ahead, read at your own risk.

Cryptography and Coding

Download Cryptography and Coding PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 9783540606932
Total Pages : 297 pages
Book Rating : 4.6/5 (69 download)

DOWNLOAD NOW!


Book Synopsis Cryptography and Coding by : Colin Boyd

Download or read book Cryptography and Coding written by Colin Boyd and published by Springer. This book was released on 1995-12-06 with total page 297 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 5th IMA Conference on Cryptography and Coding, held in Cirencester, UK in December 1995. The volume presents 22 full revised papers selected from 48 submissions together with five invited full papers and three abstracts on the mathematical theory and practice of cryptography and coding; continuing advances in these strongly related areas are crucial for the security and reliability of data communication, processing, and storage. Among the topics addressed are linear codes, error-correcting codes, decoding, key distribution, authentication, hash functions, block ciphers, cryptanalysis, and electronic cash.

Secrets and Lies

Download Secrets and Lies PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1119092434
Total Pages : 453 pages
Book Rating : 4.1/5 (19 download)

DOWNLOAD NOW!


Book Synopsis Secrets and Lies by : Bruce Schneier

Download or read book Secrets and Lies written by Bruce Schneier and published by John Wiley & Sons. This book was released on 2015-03-23 with total page 453 pages. Available in PDF, EPUB and Kindle. Book excerpt: This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.

Contemporary Cryptology

Download Contemporary Cryptology PDF Online Free

Author :
Publisher : Wiley-IEEE Press
ISBN 13 : 9780780353527
Total Pages : 0 pages
Book Rating : 4.3/5 (535 download)

DOWNLOAD NOW!


Book Synopsis Contemporary Cryptology by : Gustavus J. Simmons

Download or read book Contemporary Cryptology written by Gustavus J. Simmons and published by Wiley-IEEE Press. This book was released on 1999-02-10 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: The field of cryptography has experienced an unprecedented development in the past decade and the contributors to this book have been in the forefront of these developments. In an information-intensive society, it is essential to devise means to accomplish, with information alone, every function that it has been possible to achieve in the past with documents, personal control, and legal protocols (secrecy, signatures, witnessing, dating, certification of receipt and/or origination). This volume focuses on all these needs, covering all aspects of the science of information integrity, with an emphasis on the cryptographic elements of the subject. In addition to being an introductory guide and survey of all the latest developments, this book provides the engineer and scientist with algorithms, protocols, and applications. Of interest to computer scientists, communications engineers, data management specialists, cryptographers, mathematicians, security specialists, network engineers.

Lectures on Data Security

Download Lectures on Data Security PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 3540657576
Total Pages : 257 pages
Book Rating : 4.5/5 (46 download)

DOWNLOAD NOW!


Book Synopsis Lectures on Data Security by : Ivan Bjerre Damgård

Download or read book Lectures on Data Security written by Ivan Bjerre Damgård and published by Springer Science & Business Media. This book was released on 1999-03-10 with total page 257 pages. Available in PDF, EPUB and Kindle. Book excerpt: This tutorial volume is based on a summer school on cryptology and data security held in Aarhus, Denmark, in July 1998. The ten revised lectures presented are devoted to core topics in modern cryptololgy. In accordance with the educational objectives of the school, elementary introductions are provided to central topics, various examples are given of the problems encountered, and this is supplemented with solutions, open problems, and reference to further reading. The resulting book is ideally suited as an up-to-date introductory text for students and IT professionals interested in modern cryptology.

The Immortality Key

Download The Immortality Key PDF Online Free

Author :
Publisher : St. Martin's Press
ISBN 13 : 125027091X
Total Pages : 340 pages
Book Rating : 4.2/5 (52 download)

DOWNLOAD NOW!


Book Synopsis The Immortality Key by : Brian C. Muraresku

Download or read book The Immortality Key written by Brian C. Muraresku and published by St. Martin's Press. This book was released on 2020-09-29 with total page 340 pages. Available in PDF, EPUB and Kindle. Book excerpt: THE NEW YORK TIMES BESTSELLER As seen on The Joe Rogan Experience! A groundbreaking dive into the role psychedelics have played in the origins of Western civilization, and the real-life quest for the Holy Grail that could shake the Church to its foundations. The most influential religious historian of the 20th century, Huston Smith, once referred to it as the "best-kept secret" in history. Did the Ancient Greeks use drugs to find God? And did the earliest Christians inherit the same, secret tradition? A profound knowledge of visionary plants, herbs and fungi passed from one generation to the next, ever since the Stone Age? There is zero archaeological evidence for the original Eucharist – the sacred wine said to guarantee life after death for those who drink the blood of Jesus. The Holy Grail and its miraculous contents have never been found. In the absence of any hard data, whatever happened at the Last Supper remains an article of faith for today’s 2.5 billion Christians. In an unprecedented search for answers, The Immortality Key examines the archaic roots of the ritual that is performed every Sunday for nearly one third of the planet. Religion and science converge to paint a radical picture of Christianity’s founding event. And after centuries of debate, to solve history’s greatest puzzle. Before the birth of Jesus, the Ancient Greeks found salvation in their own sacraments. Sacred beverages were routinely consumed as part of the so-called Ancient Mysteries – elaborate rites that led initiates to the brink of death. The best and brightest from Athens and Rome flocked to the spiritual capital of Eleusis, where a holy beer unleashed heavenly visions for two thousand years. Others drank the holy wine of Dionysus to become one with the god. In the 1970s, renegade scholars claimed this beer and wine – the original sacraments of Western civilization – were spiked with mind-altering drugs. In recent years, vindication for the disgraced theory has been quietly mounting in the laboratory. The constantly advancing fields of archaeobotany and archaeochemistry have hinted at the enduring use of hallucinogenic drinks in antiquity. And with a single dose of psilocybin, the psychopharmacologists at Johns Hopkins and NYU are now turning self-proclaimed atheists into instant believers. But the smoking gun remains elusive. If these sacraments survived for thousands of years in our remote prehistory, from the Stone Age to the Ancient Greeks, did they also survive into the age of Jesus? Was the Eucharist of the earliest Christians, in fact, a psychedelic Eucharist? With an unquenchable thirst for evidence, Muraresku takes the reader on his twelve-year global hunt for proof. He tours the ruins of Greece with its government archaeologists. He gains access to the hidden collections of the Louvre to show the continuity from pagan to Christian wine. He unravels the Ancient Greek of the New Testament with the world’s most controversial priest. He spelunks into the catacombs under the streets of Rome to decipher the lost symbols of Christianity’s oldest monuments. He breaches the secret archives of the Vatican to unearth manuscripts never before translated into English. And with leads from the archaeological chemists at UPenn and MIT, he unveils the first scientific data for the ritual use of psychedelic drugs in classical antiquity. The Immortality Key reconstructs the suppressed history of women consecrating a forbidden, drugged Eucharist that was later banned by the Church Fathers. Women who were then targeted as witches during the Inquisition, when Europe’s sacred pharmacology largely disappeared. If the scientists of today have resurrected this technology, then Christianity is in crisis. Unless it returns to its roots. Featuring a Foreword by Graham Hancock, the NYT bestselling author of America Before.

Fundamentals of Cryptology

Download Fundamentals of Cryptology PDF Online Free

Author :
Publisher : Springer Science & Business Media
ISBN 13 : 0306470535
Total Pages : 496 pages
Book Rating : 4.3/5 (64 download)

DOWNLOAD NOW!


Book Synopsis Fundamentals of Cryptology by : Henk C.A. van Tilborg

Download or read book Fundamentals of Cryptology written by Henk C.A. van Tilborg and published by Springer Science & Business Media. This book was released on 2006-04-18 with total page 496 pages. Available in PDF, EPUB and Kindle. Book excerpt: The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.

Real-World Cryptography

Download Real-World Cryptography PDF Online Free

Author :
Publisher : Simon and Schuster
ISBN 13 : 1638350841
Total Pages : 398 pages
Book Rating : 4.6/5 (383 download)

DOWNLOAD NOW!


Book Synopsis Real-World Cryptography by : David Wong

Download or read book Real-World Cryptography written by David Wong and published by Simon and Schuster. This book was released on 2021-10-19 with total page 398 pages. Available in PDF, EPUB and Kindle. Book excerpt: "A staggeringly comprehensive review of the state of modern cryptography. Essential for anyone getting up to speed in information security." - Thomas Doylend, Green Rocket Security An all-practical guide to the cryptography behind common tools and protocols that will help you make excellent security choices for your systems and applications. In Real-World Cryptography, you will find: Best practices for using cryptography Diagrams and explanations of cryptographic algorithms Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem Real-World Cryptography reveals the cryptographic techniques that drive the security of web APIs, registering and logging in users, and even the blockchain. You’ll learn how these techniques power modern security, and how to apply them to your own projects. Alongside modern methods, the book also anticipates the future of cryptography, diving into emerging and cutting-edge advances such as cryptocurrencies, and post-quantum cryptography. All techniques are fully illustrated with diagrams and examples so you can easily see how to put them into practice. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Cryptography is the essential foundation of IT security. To stay ahead of the bad actors attacking your systems, you need to understand the tools, frameworks, and protocols that protect your networks and applications. This book introduces authentication, encryption, signatures, secret-keeping, and other cryptography concepts in plain language and beautiful illustrations. About the book Real-World Cryptography teaches practical techniques for day-to-day work as a developer, sysadmin, or security practitioner. There’s no complex math or jargon: Modern cryptography methods are explored through clever graphics and real-world use cases. You’ll learn building blocks like hash functions and signatures; cryptographic protocols like HTTPS and secure messaging; and cutting-edge advances like post-quantum cryptography and cryptocurrencies. This book is a joy to read—and it might just save your bacon the next time you’re targeted by an adversary after your data. What's inside Implementing digital signatures and zero-knowledge proofs Specialized hardware for attacks and highly adversarial environments Identifying and fixing bad practices Choosing the right cryptographic tool for any problem About the reader For cryptography beginners with no previous experience in the field. About the author David Wong is a cryptography engineer. He is an active contributor to internet standards including Transport Layer Security. Table of Contents PART 1 PRIMITIVES: THE INGREDIENTS OF CRYPTOGRAPHY 1 Introduction 2 Hash functions 3 Message authentication codes 4 Authenticated encryption 5 Key exchanges 6 Asymmetric encryption and hybrid encryption 7 Signatures and zero-knowledge proofs 8 Randomness and secrets PART 2 PROTOCOLS: THE RECIPES OF CRYPTOGRAPHY 9 Secure transport 10 End-to-end encryption 11 User authentication 12 Crypto as in cryptocurrency? 13 Hardware cryptography 14 Post-quantum cryptography 15 Is this it? Next-generation cryptography 16 When and where cryptography fails