Next Generation Mechanism for Data Encryption -

Next Generation Mechanism for Data Encryption

Buch | Hardcover
278 Seiten
2025
CRC Press (Verlag)
978-1-032-83284-5 (ISBN)
149,60 inkl. MwSt
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data such as asymmetry encryption, digital signatures, and hash functions. It also covers the mathematics behind the use of algorithms for encryption and decryption.
This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption.

Features



Presents clear insight to the readers about the various security algorithms and the different mechanisms used for data encryption.
Discusses algorithms such as symmetric encryption, asymmetry encryption, digital signatures, and hash functions used for encryption.
Covers techniques and methods to optimize the mathematical steps of security algorithms to make those algorithms lightweight, which can be suitable for voice encryption.
Illustrates software methods to implement cryptography algorithms.
Highlights a comparative analysis of models that are used in implementing cryptography algorithms.

The text is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer science and engineering, and information technology.

Keshav Kumar is an Assistant Professor in Computer Science Engineering Department at Parul University, Gujrat, India. He is pursuing his PhD in the field of deep learning from Bennett University, Noida, India. He has worked with Chandigarh University, Punjab,India (NIRF 29). He has completed his Master of Engineering in Electronics and Communication Engineering (ECE) with a specialisation in Hardware Security from Chitkara University, Punjab, India. He is pursuing PhD in the filed of Hardware Security from Lingaya’s Vidyapeeth, Faridabad, India. He has authored and co-authored one book with CRC, Taylor & Francis Press, and more than 40 research papers in the field of hardware security, green communication, low-power VLSI design, machine learning techniques, and the Internet of Things (IoT). He has also worked with professors from 20 different countries. His areas of specialisation include deep learning, hardware security, green communication,low-power VLSI design, machine learning techniques, Wireless Sensor Networks (WSN), and IoT. He has experience teaching Python programming, embedded systems, IoT, computer networks, and digital electronics. He is also associated with Gyancity Research Consultancy Pvt Ltd. He is also a member of International Association of Engineers (IAENG). His work has been cited more than 600 times, according to Google Scholar, with an h-index of 14 and 12, according to Google Scholar Scopus, respectively. Dr. Bishwajeet Kumar Pandey is a Professor at Department of MCA, GL Bajaj College of Technology and Management, Greater Noida, India. Mail id: dr.pandey@ieee.org. He is a senior member of Institute of Electrical and Electronics Engineers (IEEE) USA since 2019. He was awarded Professor of the Year 2023 at Lords Cricket Ground by the London Organization of Skills Development (LOSD), UK. He is also a visiting professor at Eurasian National University, Astana,Kazakhstan (QS World Rank 355) and UCSI University, Kuala Lumpur,Malaysia (QS World Rank 300). He is a research Fellow at the University of Sultan Zainul Abdin (UniSZA), Malaysia. He was the Research Head of the School of Computer Science and Engineering at Jain University (NIRF India Rank 68), Bangalore, India. He holds a PhD in Computer Science and Engineering from Gran Sasso Science Institute, Italy. He completed a master’s degree from the Indian Institute of Information Technology (IIIT), Gwalior, India. With more than 15 years of experience, he has worked as a Research Consultant and Associate Visiting Professor. He has also held positions as an Assistant Professor at various universities, including Chitkara University, Chandigarh, India (QS World Rank 1200–1400), and Birla Institute of Applied Science Bhimtal India. Dr Pandey has visited 47 countries and attended 101 conferences, receiving the best paper awards in multiple countries. He has authored more than 200 papers and published ten books. with interests in green computing, high-performance computing, cyber–physical systems, machine learning, and cybersecurity, he has several Indian patents and serves on the board of directors for studentfounded startups. He has more than 3,100 citations, according to Google Scholar, with an h-index of 27 and 19, according to Google Scholar and Scopus, respectively. He has generated revenue of 20 million INR in his start-up Gyancity Research Consultancy Pvt Ltd since 2018. He is a program committee chair of the 9th International Conference on Recent Trends in Computer Science and Engineering (RTCSE) January 3–5, 2025,Room 105, University of Hawaii (Manoa Campus), Manoa 2520 Correa Road, IT Center Honolulu, Hawaii, USA. He is the main organiser of the 10th International Conference on Green Computing and Engineering Technologies (ICGCET®), September 18–19, 2024, Sea Cliff Resort, Zanzibar.

1. Oepning the Vault for Securing the Communication: An Introduction to Cryptography. 2. Guardians of Privacy: Unrevaling Public-Key Cryptography. 3. Cryptography Algorithms to Prevent the Different Security Attacks. 4. Hash Functions and Message Digest. 5. Quantum Cryptography. 6. Cryptanalysis using Crypt Tool and Alpha Peeler. 7. Quantum Cryptography: An In-Depth Exploration of Principles and Techniques. 8. Securing Patient Information: A Multi-layered Cryptographic Approach in IoT Healthcare. 9. Exploring Advancements, Applications, and Challenges in the Realm of Quantum Cryptography. 10. Cryptography in Industry: Safeguarding Digital Assets and Transactions. 11. Cryptography in Practice. 12. Output Load Capacitance Scaling Based Low Power Design of ECC Algorithm. 13. Implementation of Lattice Based Cryptography Cyber Forensic System. 14. Cryptography in Digital Forensics. 15. Cryptography Tools in Ethical Hacking. 16. Exploring the Future Trends of Cryptography. 17. Safeguarding the Future through the Prevention of Cybercrime in the Quantum Computing Era. 18. Low Power Design of DES Encryption Algorithm on 28 nm FPGA Using HSTL IO Standard.

Erscheint lt. Verlag 24.1.2025
Zusatzinfo 24 Tables, black and white; 53 Line drawings, black and white; 51 Halftones, black and white; 104 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Themenwelt Mathematik / Informatik Informatik Software Entwicklung
Technik Elektrotechnik / Energietechnik
Technik Nachrichtentechnik
Technik Umwelttechnik / Biotechnologie
ISBN-10 1-032-83284-3 / 1032832843
ISBN-13 978-1-032-83284-5 / 9781032832845
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Deterministische und randomisierte Algorithmen

von Volker Turau; Christoph Weyer

Buch | Softcover (2024)
De Gruyter Oldenbourg (Verlag)
64,95
Programmieren erlernen und technische Fragestellungen lösen

von Harald Nahrstedt

Buch | Softcover (2023)
Springer Vieweg (Verlag)
44,99