Development of Cryptography since Shannon

dc.contributor.authorKoç, Ç.K.
dc.contributor.authorÖzdemir, F.
dc.date.accessioned2024-05-19T14:34:46Z
dc.date.available2024-05-19T14:34:46Z
dc.date.issued2023
dc.departmentİstinye Üniversitesien_US
dc.description.abstractCryptographic algorithms of the past millennia were formulated under a single model by Claude Shannon in 1948, marking the beginning of modern cryptography. Various types of homomorphic encryption allow the reader to encrypt everything and work with encrypted data so that neither the computers nor the network need to be trusted. The interplay between cryptographic theory and applications opened up new areas of applications and also motivated the practitioners of the theory to develop new methods and algorithms. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering. A public-key encryption algorithm is also a digital signature algorithm, the most notable example being the RSA algorithm. The quantum computer was developed based on the principles of quantum physics to perform computations. © 2024 selection and editorial matter, Sedat Akleylek and Besik Dundua; individual chapters, the contributors.en_US
dc.identifier.doi10.1201/9781003090052-1
dc.identifier.endpage56en_US
dc.identifier.isbn9781000955477
dc.identifier.isbn9780367546656
dc.identifier.scopus2-s2.0-85173295069en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.startpage1en_US
dc.identifier.urihttps://doi.org/10.1201/9781003090052-1
dc.identifier.urihttps://hdl.handle.net/20.500.12713/4550
dc.indekslendigikaynakScopusen_US
dc.language.isoenen_US
dc.publisherCRC Pressen_US
dc.relation.ispartofHandbook of Formal Analysis and Verification in Cryptographyen_US
dc.relation.publicationcategoryKitap Bölümü - Uluslararasıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.snmz20240519_kaen_US
dc.titleDevelopment of Cryptography since Shannonen_US
dc.typeBook Chapteren_US

Dosyalar