Gratis Versand in ganz Österreich
Bookbot

Evelyn Ackermann

    Caesura in Cryptography [Paperback]
    Caesura in Cryptography
    Dolls in Miniature
    • Dolls in Miniature

      A Portrayal of Society Through Tiny Dolls, Their Fashions, and Environments, 1700-1930

      5,0(1)Abgeben
      Dolls in Miniature
    • Caesura in Cryptography

      My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University and Leisure.

      Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics like: Asymmetric Symmetric Encryption; Third Epoch of Cryptography: No Key Transport - instead: Derived Keys; Caesura in Cryptography: Juggernaut and Secret Stream Keys; Ciphers Algorithms Multi-Encryption: e.g. McEliece NTRU; Else to know: RNG, MAC, OTP, GNUPG, PKI, Hash, Signatures, GoldBugs, EPKS, SMP; End-to-End Encryption: Instant Perfect Forward Secrecy (IPFS); Cryptographic Calling: e.g. Two-Way-Calling, Repleo, EPKS, AutoCrypt; Volatile Encryption Exponential Encryption; Cryptographic Discovery Cryptographic Tokens; Echo Protocol Graph Theory; POPTASTIC Protocol: Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning Tutorials; Quantum Computing and Cryptography; Frameworks Libraries: e.g. McNoodle McEliece library (C++); Tools: POPTASTIC Delta Chat, Smoke McEliece Java Messenger, et al.; Trends on Crypto Messaging Open Source Cryptography; Encryption of the Hard Disc, Text and Files, P2P Networks; Trusted Execution Environments (TEE) SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions.

      Caesura in Cryptography
    • Caesura in Cryptography [Paperback]

      My first Workshop about Encryption - An Introduction with Teaching and Learning Material for School, University and Leisure.

      Within the Learning Material of over 100 open source slides created for Courses, Tutorials and Workshops within Cryptography the authors address topics Asymmetric & Symmetric Encryption; Third Epoch of No Key Transport - Derived Keys; Caesura in Juggernaut and Secret Stream Keys; Ciphers & Algorithms & e.g. McEliece & NTRU; Else to RNG, MAC, OTP, GNUPG, PKI, Hash, Signatures, GoldBugs, EPKS, SMP; End-to-End Instant Perfect Forward Secrecy (IPFS); Cryptographic e.g. Two-Way-Calling, Repleo, EPKS, AutoCrypt; Volatile Encryption & Exponential Encryption; Cryptographic Discovery & Cryptographic Tokens; Echo Protocol & Graph Theory; POPTASTIC Chat over POP3/IMAP; Spot-On Encryption Suite as elaborated Software for Learning & Tutorials; Quantum Computing and Cryptography; Frameworks & e.g. McNoodle McEliece library (C++); POPTASTIC Delta Chat, Smoke McEliece Java Messenger, et al.; Trends on Crypto Messaging & Open Source Cryptography; Encryption of the Hard Disc, Text and Files, P2P Networks; Trusted Execution Environments (TEE) & SAM Architecture; National Sovereignty of cryptographic projects and open source worldwide contributions.

      Caesura in Cryptography [Paperback]