Cryptography

This module explores cryptography, focusing on the techniques used to secure communication through encryption. It covers key concepts such as symmetric and asymmetric encryption, cryptographic protocols, and the application of cryptography in securing data.

Portal > Cybersecurity > Cryptography

Curriculum Builder

Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

https://doi.org/10.1201/9780429466335

Stransky, Christian, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. “On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security.” In Proceedings of the Seventeenth USENIX Conference on Usable Privacy and Security, 437–54. SOUPS’21. USA: USENIX Association, 2021.

Katz, Jonathan, and Yehuda Lindell. Introduction to Modern Cryptography. 2nd ed. Chapman & Hall/Crc Cryptography and Network Security Series. Boca Raton: CRC Press/Taylor & Francis, 2015.

Adams, Carlisle, and Steve Lloyd. Understanding PKI: Concepts, Standards, and Deployment Considerations. 2nd ed. Boston: Addison-Wesley, 2003.

Stinson, Douglas R., and Maura B. Paterson. Cryptography: Theory and Practice. 4th ed. Boca Raton: CRC Press, Taylor & Francis Group, 2019.

Stallings, William. Cryptography and network security: principles and practice. 7th ed. Uttar Pradesh, India: Pearson, 2022.

Alexander, David, Amanda Finch, and David Sutton. Information Security Management Principles. Edited by Andy Taylor. Second edition. Swindon, UK: BCS, the Chartered Institute for IT, 2013.

Hopkin, Paul. Fundamentals of Risk Management: Understanding, Evaluating and Implementing Effective Risk Management. 5th Edition. London ; New York: Kogan Page, 2018.

Kaufman, Charlie, Radia Perlman, and Michael Speciner. Network Security: Private Communication in a Public World. 2nd ed. Prentice Hall Series in Computer Networking and Distributed Systems. Upper Saddle River, NJ: Prentice Hall PTR, 2002.

Thank you for signing up to our newsletter!

Thank you! RSVP received for Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

Thank you for applying! We will be in touch.

Apply for: Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

Menezes, Alfred J., Paul C. Van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. 1st ed. CRC Press, 2018.

Loading...

Loading…