The Design of Rijndael: The Advanced Encryption Standard (Aes), Daemen Joan, Rijmen Vincent
Автор: Eli Biham; Adi Shamir Название: Differential Cryptanalysis of the Data Encryption Standard ISBN: 1461393167 ISBN-13(EAN): 9781461393160 Издательство: Springer Рейтинг: Цена: 97820.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem.
Автор: El Aimani Laila Название: Verifiable Composition of Signature and Encryption: A Comprehensive Study of the Design Paradigms ISBN: 3319885510 ISBN-13(EAN): 9783319885513 Издательство: Springer Рейтинг: Цена: 93160.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.
Автор: Daemen Joan, Rijmen Vincent Название: The Design of Rijndael: The Advanced Encryption Standard (Aes) ISBN: 3662607689 ISBN-13(EAN): 9783662607688 Издательство: Springer Рейтинг: Цена: 149060.00 T Наличие на складе: Нет в наличии. Описание: An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known.
Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book.
With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
Автор: David P. Leech, Leech Stacey Ferris, Ferris John T. Scott, Scott Название: Economic impacts of the advanced encryption standard, 1996-2017 ISBN: 1680835882 ISBN-13(EAN): 9781680835885 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 81310.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Evaluates the net social benefits of advanced encryption standards. This is one of many areas where the National Institute for Standards and Technology has promoted innovation and industrial competitiveness to ensure that public and private computer systems can protect the confidentiality, availability, and integrity of digital information.
Автор: Carlos Cid; Sean Murphy; Matthew Robshaw Название: Algebraic Aspects of the Advanced Encryption Standard ISBN: 1441937293 ISBN-13(EAN): 9781441937292 Издательство: Springer Рейтинг: Цена: 97820.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: to the AES.- Mathematical Background.- Description of the AES.- Algebraic Properties of the AES.- Equation Systems for the AES.- Analysis of AES Equation Systems.- Closing Remarks.
Автор: Ryabko, Boris Fionov, Andrey Название: Cryptography in the information society ISBN: 9811226156 ISBN-13(EAN): 9789811226151 Издательство: Marston Book Services Рейтинг: Цена: 105600.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.
Автор: Alka Agrawal, Brijesh K. Chaurasia, Neeraj Kumar, Raees Ahmad Khan Название: Limitations and Future Applications of Quantum Cryptography ISBN: 1799866785 ISBN-13(EAN): 9781799866787 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 181110.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.
Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
Автор: Alka Agrawal, Brijesh K. Chaurasia, Neeraj Kumar, Raees Ahmad Khan Название: Limitations and Future Applications of Quantum Cryptography ISBN: 1799866777 ISBN-13(EAN): 9781799866770 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 239310.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.
Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
Автор: Shi Nansi Название: Architectures and Frameworks for Developing and Applying Blockchain Technology ISBN: 1522592571 ISBN-13(EAN): 9781522592570 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 239310.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.
Автор: Yousif Abdullatif Albastaki, Wasan Awad Название: Implementing Computational Intelligence Techniques for Security Systems Design ISBN: 1799824195 ISBN-13(EAN): 9781799824190 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 134910.00 T Наличие на складе: Есть у поставщика Поставка под заказ. Описание: Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues.
Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.
Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2) ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz