(Ilmumisaeg: 06-Oct-2006, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Loe edasi...
(Ilmumisaeg: 09-Aug-2024, Hardback, Kirjastus: Springer-Verlag New York Inc., ISBN-13: 9780387271590)
Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CAs). The CAs issue certificates that establish ownership of public keys, which can be used to support...Loe edasi...
This book constitutes the refereed post-conference proceedings of the Fourth International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.The 9 full papers and 2 invited...Loe edasi...
This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020.The 17 full and 9 short papers were carefully reviewed and sel...Loe edasi...
(Ilmumisaeg: 30-Nov-2019, Hardback, Kirjastus: American Mathematical Society, ISBN-13: 9781470450557)
Knospe explains the current cryptographic primitives and schemes, and outlines the essential mathematics required to understand the building blocks and assess their security. He begins by introducing the open-source software SageMath, which he us...Loe edasi...
All current methods of secure communication such as public-key cryptography can eventually be broken by faster computing. At the interface of physics and computer science lies a powerful solution for secure communications: quantum cryptography. Becau...Loe edasi...
This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.*The seven papers presented in this book were carefully re...Loe edasi...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryp...Loe edasi...
Blockchain should be easy to understand, but the so-called “experts” always explain it in such a complicated way! Through 200 original illustrations, this book provides simple explanation of Blockchain technology: what Blockchain is and how it works....Loe edasi...
This book focuses on the design methods for reconfigurable computing processors for cryptographic algorithms. It covers the dynamic reconfiguration analysis of cryptographic algorithms, hardware architecture design, and compilation techniques for...Loe edasi...
This book constitutes the proceedings of the Third International Conference on Codes, Cryptology and Information Security, C2SI 2019, held in Rabat, Morocco, in April 2019. The 19 regular papers presented together with 5 invited talk...Loe edasi...
Shemanske presents some of the vistas of modern mathematics to undergraduate students who have just started their mathematical education, with the intention of enticing and guiding them into taking mathematics courses beyond the typical calculus...Loe edasi...
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016. The 14 revised full papers and 3 invited talks presented...Loe edasi...
This book constitutes the proceedings of the Second International Conference on Codes, Cryptology and Information Security, C2SI 2017, held in Rabat, Morocco, in April 2017.The 19 regular papers presented together with 5 invited talks were carefully...Loe edasi...
The Principles and Practice of Cryptography and Network SecurityStallings’ Cryptography and Network Security, Seventh Edition,introduces the reader to the compelling and evolving fi...Loe edasi...
(Ilmumisaeg: 06-Jan-2016, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783319258218)
This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms...Loe edasi...
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Symposium on Foundations and Practice of Security, FPS 2016, held in Québec City, QC, Canada, in October 2016.The 18 revised regular papers presented...Loe edasi...
(Ilmumisaeg: 09-Nov-2016, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662538869)
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.T...Loe edasi...
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential...Loe edasi...