(Ilmumisaeg: 06-Oct-2006, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783540245025)
In todays unsafe and increasingly wired world cryptology plays a vital role in protecting communication channels, databases, and software from unwanted intruders. This revised and extended third edition of the classic reference work on cryptology no...Loe edasi...
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols. The chapt...Loe edasi...
(Ilmumisaeg: 16-May-2024, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662690062)
Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.Heavily revised and updated, the long-awaited second ed...Loe edasi...
This book constitutes the refereed post-conference proceedings of the Fourth International Conference on Number-Theoretic Methods in Cryptology, NuTMiC 2024, held in Szczecin, Poland, during June 24–26, 2024.The 9 full papers and 2 invited...Loe edasi...
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols....Loe edasi...
V. Seethalakshmi, Rajesh Kumar Dhanaraj, S. Suganyadevi, Mariya Ouaissa
(Ilmumisaeg: 02-Aug-2023, Hardback, Kirjastus: Springer International Publishing AG, ISBN-13: 9783031355349)
This book offers insights on efficient utilization of homomorphic encryption (HE) for financial cryptography in confidentiality, phishing, anonymity, object and user identity protection. Homomorphic encryption has the potential to be a game-change...Loe edasi...
(Ilmumisaeg: 04-Jan-2021, Hardback, Kirjastus: World Scientific Publishing Co Pte Ltd, ISBN-13: 9789811226151)
This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block cipher...Loe edasi...
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes....Loe edasi...
(Ilmumisaeg: 10-Sep-2020, Hardback, Kirjastus: Oxford University Press, ISBN-13: 9780198862840)
Cryptographic Primitives in Blockchain Technology provides an introduction to the mathematical and cryptographic concepts behind blockchain technologies and shows how they are applied in blockchain-based systems. Many online applications, esp...Loe edasi...
Sari: Advances in Information Security, Privacy, and Ethics
(Ilmumisaeg: 16-Aug-2017, Hardback, Kirjastus: Information Science Reference, ISBN-13: 9781522529156)
This book provides the resources necessary for cryptographers, cryptanalysts, developers, and information technology managers to adopt and implement techniques for solving complex problems in cryptography. It addresses techniques for solving the pro...Loe edasi...
Pairings are interesting tools for cryptographers, because they provide new protocols such as identity-based cryptography, plus they allow the simplification of existing protocols such as signature schemes. The implementation of a pairing involves...Loe edasi...
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on the Arithmetic of Finite Field, WAIFI 2016, held in Ghent, Belgium, in July 2016. The 14 revised full papers and 3 invited talks presented...Loe edasi...
(Ilmumisaeg: 09-Nov-2016, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662538869)
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.T...Loe edasi...
(Ilmumisaeg: 23-Oct-2016, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662536407)
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.The total of 45 revised full papers presented in th...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
A Practical Guide to Cryptography Principles and Security PracticesEmploy cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills an...Loe edasi...
(Ilmumisaeg: 09-Oct-2015, Hardback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662479735)
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identificat...Loe edasi...
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis•Written by authors known within the academic cryptography community, this book presents the latest...Loe edasi...
(Ilmumisaeg: 21-Jul-2016, Paperback / softback, Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, ISBN-13: 9783662530078)
The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.The 70 revised full papers presented...Loe edasi...
This book constitutes the thoroughly refereed conference proceedings of the 7th International Conference on Trusted Systems, INTRUST 2015, held in Beijing, China, in December 2015.The revised 12 full papers presented have been carefully rev...Loe edasi...
This book constitutes the thoroughly refereedpost-conference proceedings of the 16th International Conference on InformationSecurity, ISC 2013, held in Dallas, Texas, in November 2013.The 16 revised full papers presented together wit...Loe edasi...
Cozzens (Rutgers U.) and Miller (Williams College) review classical methods of encrypting messages and introduce modern encryption and decryption methods based on binary expansions, recurrence relations, graph theory, public key, digital signatures,...Loe edasi...