Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7 707 857-29-98
  +7(7172) 65-23-70
  10:00-18:00 пн-пт
  shop@logobook.kz
   
    Поиск книг                        
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Бестселлеры | |
 

Modern cryptography volume 2, Zheng, Zhiyong Tian, Kun Liu, Fengxia


Варианты приобретения
Цена: 37260.00T
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Англия: 1 шт.  Склад Америка: 128 шт.  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября

Добавить в корзину
в Мои желания

Автор: Zheng, Zhiyong Tian, Kun Liu, Fengxia
Название:  Modern cryptography volume 2
ISBN: 9789811976469
Издательство: Springer
Классификация:


ISBN-10: 9811976465
Обложка/Формат: Paperback
Страницы: 191
Вес: 0.32 кг.
Дата издания: 17.01.2023
Серия: Financial mathematics and fintech
Язык: English
Издание: 1st ed. 2023
Иллюстрации: 2 illustrations, black and white; xi, 191 p. 2 illus.
Размер: 155 x 233 x 22
Читательская аудитория: Professional & vocational
Подзаголовок: A classical introduction to informational and mathematical principle
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of ambiguity in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.
Дополнительное описание: Chapter 1. Gauss lattice theory.- Chapter 2. Reduction principle of Ajtai.- Chapter 3. Learning with errors.- Chapter 4. LWE cryptosystem.- Chapter 5. Cyclic lattice and Ideal lattice.- Chapter 6. Fully Homomorphic Encryption.- Chapter 7. General NTRU cry


Boolean Functions for Cryptography and Coding Theory

Автор: Claude Carlet
Название: Boolean Functions for Cryptography and Coding Theory
ISBN: 1108473806 ISBN-13(EAN): 9781108473804
Издательство: Cambridge Academ
Рейтинг:
Цена: 79200.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This complete and accessible survey of Boolean functions for cryptography and coding, written for researchers and graduate students, balances all necessary background with comprehensive state of the art coverage, and tackles recent problems and applications like side channel attacks, Gowers norm, and cloud computing.

Cryptography and network security /

Автор: Alencar, Marcelo S.,
Название: Cryptography and network security /
ISBN: 8770224072 ISBN-13(EAN): 9788770224079
Издательство: Taylor&Francis
Рейтинг:
Цена: 122490.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: It comprises twelve chapters divided into two parts discussing "Non-neutral Evolution on Human Genes" (Part I) and "Evolution of Modern Human Populations" (Part II.)The most significant feature of this book is the continent-wise discussion of modern human dispersal using human genomic data in Part II.

Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part I

Автор: Borisov Nikita, Diaz Claudia
Название: Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part I
ISBN: 3662643219 ISBN-13(EAN): 9783662643211
Издательство: Springer
Рейтинг:
Цена: 111790.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Smart Contracts.- Anonymity and Privacy in Cryptocurrencies.- Secure Multi-Party Computation.- System and Application Security.- Zero-Knowledge Proofs.- Blockchain Protocols.- Payment Channels.- Mining.- Scaling Blockchains.- Authentication and Usability.- Measurement.- Cryptography.

Handbook of applied cryptography

Автор: Menezes, A.j. Oorschot, Paul Van Vanston, Scott A.
Название: Handbook of applied cryptography
ISBN: 0849385237 ISBN-13(EAN): 9780849385230
Издательство: Taylor&Francis
Рейтинг:
Цена: 163330.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. This title provides a treatment that introduces the practical aspects of both conventional and public-key cryptography.

Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers

Автор: Altawy Riham, Hьlsing Andreas
Название: Selected Areas in Cryptography: 28th International Conference, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers
ISBN: 3030992764 ISBN-13(EAN): 9783030992767
Издательство: Springer
Рейтинг:
Цена: 74530.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.* The 23 full papers presented in this volume were carefully reviewed and selected from 60 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions. *The conference was originally planned to take place at the University of Victoria, BC, Canada. Due to the COVID-19 pandemic, it was held virtually.

Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Paper

Автор: Bonneau Joseph, Heninger Nadia
Название: Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Paper
ISBN: 3030512797 ISBN-13(EAN): 9783030512798
Издательство: Springer
Рейтинг:
Цена: 93160.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions.

Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography

Автор: Vollala
Название: Energy-Efficient Modular Exponential Techniques for Public-Key Cryptography
ISBN: 3030745260 ISBN-13(EAN): 9783030745264
Издательство: Springer
Рейтинг:
Цена: 158380.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency.

Applied Cryptography in Computer and Communications: First Eai International Conference, Ac3 2021, Virtual Event, May 15-16, 2021, Proceedings

Автор: Chen Bo, Huang Xinyi
Название: Applied Cryptography in Computer and Communications: First Eai International Conference, Ac3 2021, Virtual Event, May 15-16, 2021, Proceedings
ISBN: 3030808505 ISBN-13(EAN): 9783030808501
Издательство: Springer
Цена: 69870.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT).

Algebraic Geometry for Coding Theory and Cryptography

Автор: Everett W. Howe; Kristin E. Lauter; Judy L. Walker
Название: Algebraic Geometry for Coding Theory and Cryptography
ISBN: 3319876759 ISBN-13(EAN): 9783319876757
Издательство: Springer
Рейтинг:
Цена: 158380.00 T
Наличие на складе: Поставка под заказ.
Описание: Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary group research completed for the February 2016 conference at the Institute for Pure and Applied Mathematics (IPAM) in cooperation with the Association for Women in Mathematics (AWM).

Public-Key Cryptography - Pkc 2020: 23rd Iacr International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, Uk, May 4-7, 2020

Автор: Kiayias Aggelos, Kohlweiss Markulf, Wallden Petros
Название: Public-Key Cryptography - Pkc 2020: 23rd Iacr International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, Uk, May 4-7, 2020
ISBN: 3030453731 ISBN-13(EAN): 9783030453732
Издательство: Springer
Цена: 46570.00 T
Наличие на складе: Поставка под заказ.
Описание: The two-volume set LNCS 12110 and 12111 constitutes the refereed proceedings of the 23rd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2020, held in Edinburgh, UK, in May 2020. The 44 full papers presented were carefully reviewed and selected from 180 submissions.

Providing Sound Foundations for Cryptography: On the work of Shafi Goldwasser and Silvio Micali

Автор: Oded Goldreich
Название: Providing Sound Foundations for Cryptography: On the work of Shafi Goldwasser and Silvio Micali
ISBN: 145037266X ISBN-13(EAN): 9781450372664
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 103210.00 T
Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cryptography is concerned with the construction of schemes that withstand any abuse.A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science.This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Cryptography with Shrinking Generators

Автор: Sara D?az Cardell; Amparo F?ster-Sabater
Название: Cryptography with Shrinking Generators
ISBN: 3030128490 ISBN-13(EAN): 9783030128494
Издательство: Springer
Рейтинг:
Цена: 55890.00 T
Наличие на складе: Поставка под заказ.
Описание:

This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.


Казахстан, 010000 г. Астана, проспект Туран 43/5, НП2 (офис 2)
ТОО "Логобук" Тел:+7 707 857-29-98 ,+7(7172) 65-23-70 www.logobook.kz
Kaspi QR
   В Контакте     В Контакте Мед  Мобильная версия