CHAPTER 14
Lightweight Cryptography and Post-Quantum Cryptography
14.1 Lightweight Cryptography Concepts
Categories of Constraints for Lightweight Cryptography
Security Considerations for Various Applications
14.2 Lightweight Cryptographic Algorithms
Authenticated Encryption with Additional Data
Asymmetric Cryptographic Algorithms
14.3 Post-Quantum Cryptography Concepts
14.4 Post-Quantum Cryptographic Algorithms
Lattice-Based Cryptographic Algorithms
Get Cryptography and Network Security Principles and Practice, 8th Edition - Pearson now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.