Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions, Mangey Ram, Rajeev Singh
Автор: Miller A. Ray Название: The Cryptographic Mathematics of Enigma ISBN: 1478379278 ISBN-13(EAN): 9781478379270 Издательство: Неизвестно Цена: 13780.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.
Автор: Kannan Balasubramanian, K. Mala, M. Rajakan Название: Cryptographic Solutions for Secure Online Banking and Commerce ISBN: 1522502734 ISBN-13(EAN): 9781522502739 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 194040.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: "This book discusses the challenges of providing security for online applications and transactions, highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols"--
Автор: Mohammad Tariq Banday Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522557423 ISBN-13(EAN): 9781522557425 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 189420.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
Автор: Banday Mohammad Tariq Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522586296 ISBN-13(EAN): 9781522586296 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 125400.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Discusses novel designs and developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. Coverage includes cryptographic algorithms, encryption techniques, and authentication procedures.
Автор: Gupta Brij, Agrawal Dharma P., Yamaguchi Shingo Название: Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security ISBN: 1522501053 ISBN-13(EAN): 9781522501053 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 296610.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Автор: Krzewinski Basil Название: Cryptographic Attacks: Computer Security Exploits ISBN: 153002529X ISBN-13(EAN): 9781530025299 Издательство: Неизвестно Цена: 68970.00 T Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Lilya Budaghyan Название: Construction and Analysis of Cryptographic Functions ISBN: 3319363581 ISBN-13(EAN): 9783319363585 Издательство: Springer Рейтинг: Цена: 65210.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.
Автор: Canteaut Anne, Standaert Franзois-Xavier Название: Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa ISBN: 3030778851 ISBN-13(EAN): 9783030778859 Издательство: Springer Цена: 121110.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
Автор: Razaque Abdul, Amsaad Fathi, Alajlan Abrar Название: Cryptographic Methods ISBN: 1973694093 ISBN-13(EAN): 9781973694090 Издательство: Неизвестно Рейтинг: Цена: 63770.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the significance of those cryptographic algorithms. It is highly useful in conducting the hands of experience. This book is designed for a wide range of individuals who are highly intrigued to improve their knowledge as a cybersecurity professional.
Автор: Gierlichs Название: Cryptographic Hardware and Embedded Systems – CHES 2016 ISBN: 3662531399 ISBN-13(EAN): 9783662531396 Издательство: Springer Рейтинг: Цена: 76400.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
Автор: Maitra Subhamoy Название: Boolean Functions: Cryptographic and Combinatorial Properties - Functions with Symmetry ISBN: 9814327131 ISBN-13(EAN): 9789814327138 Издательство: World Scientific Publishing Рейтинг: Цена: 141510.00 T Наличие на складе: Поставка под заказ. Описание: This book discusses cryptographic and combinatorial properties of Boolean functions. Boolean functions are very easy to understand (but deep in analysis) and the subject covers significant amount of material in digital circuits, communication theory, VLSI design, computer science, coding theory and Mathematics. Boolean function is considered as one of the most basic building blocks in cryptographic system design. The properties that make a Boolean function suitable for a cryptographic system, are mostly combinatorial. We discuss these properties (e.g., balancedness, nonlinearity, correlation immunity, propagation characteristics, algebraic immunity) in detail. For each of the properties, existing research results and the recent contributions in the literature will be presented. The basic material will always contain hardcore theoretical results. However, we present the materials in a way that a person with undergraduate level mathematical background can access it. Implementation details related to these properties (e.g., how to check in writing a program whether a Boolean function is correlation immune) will be detailed.In addition to theoretical construction techniques for Boolean functions with different combinatorial and cryptographic properties, the book will concentrate on different state-of-the-art search techniques. In some cases these search techniques provide better results than the construction techniques for low number of input variables and they are quite interesting as the size of the complete set of Boolean functions is super exponential in the number of input variables. Different symmetries in the set of Boolean functions will also be presented in detail. The author will present the inherent beauty of Boolean functions that he has experienced in his research career.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz