0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Selected Areas in Cryptography - 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999... Selected Areas in Cryptography - 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings (Paperback, 2000 ed.)
Howard Heys, Carlisle Adams
R1,470 Discovery Miles 14 700 Ships in 18 - 22 working days

SAC'99 was the sixth in a series of annual workshops on Selected Areas in Cryptography. Previous workshops were held at Carleton University in Ottawa (1995 and 1997) and at Queen's University in Kingston (1994, 1996, and 1998). The intent of the annual workshop is to provide a relaxed atmosphere in which researchers in cryptography can present and discuss new work on selected areas of current interest. The themes for the SAC'99 workshop were: { Design and Analysis of Symmetric Key Cryptosystems { E cient Implementations of Cryptographic Systems { Cryptographic Solutions for Web/Internet Security The timing of the workshop was particularly fortuitous as the announcement by NIST of the v e nalists for AES coincided with the rst morning of the workshop, precipitating lively discussion on the merits of the selection! A total of 29 papers were submitted to SAC'99 and, after a review process that had all papers reviewed by at least 3 referees, 17 were accepted and p- sented. As well, two invited presentations were given: one by Miles Smid from NIST entitled \From DES to AES: Twenty Years of Government Initiatives in Cryptography"and the other by Mike Reiter from Bell Labs entitled \Password Hardening with Applications to VPN Security". The program committee for SAC'99 consisted of the following members: Carlisle Adams, Tom Cusick, Howard Heys, Lars Knudsen, Henk Meijer, Luke O'Connor, Doug Stinson, Stao rd Tavares, and Serge Vaudenay.

Coding Theory and Cryptography - From Enigma and Geheimschreiber to Quantum Theory (Paperback, illustrated edition): David... Coding Theory and Cryptography - From Enigma and Geheimschreiber to Quantum Theory (Paperback, illustrated edition)
David Joyner
R2,645 Discovery Miles 26 450 Ships in 18 - 22 working days

The National Security Agency funded a conference on Coding theory, Cryp- tography, and Number Theory (nick-named Cryptoday) at the United States Naval Academy, on October 25-27, 1998. We were very fortunate to have been able to attract talented mathematicians and cryptographers to the meeting. Unfortunately, some people couldn't make it for either scheduling or funding reasons. Some of these have been invited to contribute a paper anyway. In addition, Prof. William Tutte and Frode Weierud have been kind enough to allow the inclusion of some very interesting unpublished papers of theirs. The papers basically fall into three catagories. Historical papers on cryp- tography done during World War II (Hatch, Hilton, Tutte, Ulfving, and Weierud), mathematical papers on more recent methods in cryptography (Cosgrave, Lomonoco, Wardlaw), and mathematical papers in coding theory (Gao, Joyner, Michael, Shokranian, Shokrollahi). A brief biography of the authors follows. - Peter Hilton is a Distinguished Professor of Mathematics Emeritus at the State University of New York at Binghamton. He worked from 1941 to 1945 in the British cryptanalytic headquarters at Bletchley Park. Profes- sor Hilton has done extensive research in algebraic topology and group theory. - William Tutte is a Distinguished Professor Emeritus and an Adjunct Pro- fessor in the Combinatorics and Optimization Department at the Univer- sity of Waterloo. He worked from 1941 to 1945 in the British cryptana- lytic headquarters at Bletchley Park. Professor Tutte has done extensive research in the field of combinatorics.

Lectures on Data Security - Modern Cryptology in Theory and Practice (Paperback, 1999 ed.): Ivan Damgard Lectures on Data Security - Modern Cryptology in Theory and Practice (Paperback, 1999 ed.)
Ivan Damgard
R1,474 Discovery Miles 14 740 Ships in 18 - 22 working days

In July 1998, a summer school in cryptology and data security was organized atthecomputersciencedepartmentofAarhusUniversity, Denmark.Thistook place as a part of a series of summer schools organized by the European Edu- tional Forum, an organizationconsisting of the researchcenters TUCS (Finland), IPA(Holland)andBRICS(Denmark, Aarhus).Thelocalorganizingcommittee consisted of Jan Camenisch, Janne Christensen, Ivan Damga? ard (chair), Karen Moller, andLouisSalvail.ThesummerschoolwassupportedbytheEuropean Union. Modern cryptology is an extremely fast growing ?eld and is of fundamental importance in very diverse areas, from theoretical complexity theory to practical electroniccommerceontheInternet.Wethereforesetouttoorganizeaschool that would enable young researchers and students to obtain an overview of some mainareas, coveringboththeoreticalandpracticaltopics.Itisfairtosaythat the school was a success, both in terms of attendance (136 participants from over20countries)andintermsofcontents.Itisapleasuretothankallofthe speakers for their cooperation and the high quality of their presentations. A total of 13 speakers gave talks: Mihir Bellare, University of California, San Diego; Gilles Brassard, University of Montreal; David Chaum, DigiCash; Ronald Cramer, ETH Zur ] ich; Ivan Damg? ard, BRICS; Burt Kaliski, RSA Inc.; Lars Knudsen, Bergen University; Peter Landrock, Cryptomathic; Kevin Mc- Curley, IBM Research, Almaden; Torben Pedersen, Cryptomathic; Bart Preneel, Leuven University; Louis Salvail, BRICS; Stefan Wolf, ETH Zur ] ich.

Advances in Cryptology - CRYPTO '99 - 19th Annual International Cryptology Conference, Santa Barbara, California, USA,... Advances in Cryptology - CRYPTO '99 - 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings (Paperback, 1999 ed.)
Michael Wiener
R1,689 Discovery Miles 16 890 Ships in 18 - 22 working days

Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB). The General Chair, Donald Beaver, was responsible for local organization and registration. The Program Committee considered 167 papers and selected 38 for presentation. This year's conference program also included two invited lectures. I was pleased to include in the program UeliM aurer's presentation "Information Theoretic Cryptography" and Martin Hellman's presentation "The Evolution of Public Key Cryptography." The program also incorporated the traditional Rump Session for informal short presentations of new results, run by Stuart Haber. These proceedings include the revised versions of the 38 papers accepted by the Program Committee. These papers were selected from all the submissions to the conference based on originality, quality, and relevance to the field of cryptology. Revisions were not checked, and the authors bear full responsibility for the contents of their papers.

Grokking Bitcoin (Paperback): Kalle Rosenbaum Grokking Bitcoin (Paperback)
Kalle Rosenbaum; Foreword by David A. Harding
R915 Discovery Miles 9 150 Ships in 10 - 15 working days

If you think Bitcoin is just an alternative currency for geeks, it's time to think again. Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoin-based financial transactions and using the blockchain for registering physical property ownership.

With this fully illustrated, easy-to-read guide, you'll finally understand how Bitcoin works, how you can use it, and why you can trust the blockchain.

Grokking Bitcoin explains why Bitcoin’s supporters trust it so deeply, and why you can too. This approachable book will introduce you to Bitcoin’s groundbreaking technology, which is the key to this world-changing system. This illustrated, easy-to-read guide prepares you for a new way of thinking with easy-to-follow diagrams and exercises. You’ll discover how Bitcoin mining works, how to accept Bitcoin, how to participate in the Bitcoin network, and how to set up a digital wallet.

Inside Blockchain, Bitcoin, and Cryptocurrencies (Hardcover): Niaz Chowdhury Inside Blockchain, Bitcoin, and Cryptocurrencies (Hardcover)
Niaz Chowdhury
R1,543 Discovery Miles 15 430 Ships in 10 - 15 working days

This book covers blockchain from the underlying principles to how it enables applications to survive and surf on its shoulder. Having covered the fundamentals of blockchain, the book turns to cryptocurrency. It thoroughly examines Bitcoin before presenting six other major currencies in a rounded discussion. The book then bridges between technology and finance, concentrating on how blockchain-based applications, including cryptocurrencies, have pushed hard against mainstream industries in a bid to cement their positions permanent. It discusses blockchain as underlying banking technology, crypto mining and offering, cryptocurrency as investment instruments, crypto regulations, and markets.

Cryptology - Classical and Modern (Hardcover, 2nd edition): Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon Cryptology - Classical and Modern (Hardcover, 2nd edition)
Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon
R3,672 Discovery Miles 36 720 Ships in 10 - 15 working days

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenere, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book. Features: Requires no prior programming knowledge or background in college-level mathematics Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenere, and Hill

Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover): Jian Gong, Wei Xu Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover)
Jian Gong, Wei Xu
R1,980 Discovery Miles 19 800 Ships in 10 - 15 working days

"A systematic review of the structure and context of the blockchain-derived economic model... (the book) describes cryptoeconomics in connection with the game theory, behavioral economics and others in simple understandable language."-Wang Feng, founder of Linekong Interactive Group and Mars Finance, partner in Geekbang Venture Capital Blockchain technology has subverted existing perceptions and is the start of an economic revolution, called, cryptoeconomics. Blockchain is a key component of cryptoeconomics. Vlad Zamfir, a developer of Ethereum, defines this term as "a formal discipline that studies protocols that governs the production, distribution, and consumption of goods and services in a decentralized digital economy. Cryptoeconomics is a practical science that focuses on the design and characterization of these protocols". This book explains the structures of blockchain-derived economic models, their history, and their application. It uses real-world cases to illustrate the relationship between cryptoeconomics and blockchain. Blockchain technology solves trust issues. A blockchain application can restrict behavior on the blockchain through a reward and punishment system that enables consensus in an innovative way. The greatest significance of cryptoeconomics lies in guaranteeing safety, stability, activity, and order in a decentralized consensus system. Security and stability are achieved mainly by cryptographical mechanisms. Activity and order are achieved through economic mechanisms. Cryptoeconomics and Blockchain: Ignighting a New Era of Blockchain discusses the most popular consensus algorithms and optimization mechanisms. With examples explained in clear and simple terms that are easy to understand, the book also explores economic mechanisms of blockchain such as game theory and behavioral economics.

Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992): Dennis Longley, Michael Shain,... Information Security - Dictionary of Concepts, Standards and Terms (Paperback, 1st ed. 1992)
Dennis Longley, Michael Shain, William Caelli
R1,498 Discovery Miles 14 980 Ships in 18 - 22 working days

Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described. The dictionary contains extended essays on risk analysis, personal computing, key management, pin management and authentication.

Handbook of Personal Data Protection (Paperback, 1st ed. 1992): Wayne Madsen Handbook of Personal Data Protection (Paperback, 1st ed. 1992)
Wayne Madsen
R4,760 Discovery Miles 47 600 Ships in 18 - 22 working days

Although the concept of personal data protection began in Europe in the early 1970s, data protection legislation has been adopted in many countries. In Europe there is a wide divergence of policies between members of the EC, non-EC members and the new democracies of Eastern Europe. This volume explains these differences and also, uniquely, focuses on the abuses of personal data in the developing nations of Latin America, Asia and Africa. It also includes the latest national and international laws, initiatives and guidelines on personal data protection. It is the first reference work to combine these various documents in a single volume source.

Advances in Computing and Information - ICCI '90 - International Conference on Computing and Information Niagara Falls,... Advances in Computing and Information - ICCI '90 - International Conference on Computing and Information Niagara Falls, Canada, May 23-26, 1990. Proceedings (Paperback, 1990 ed.)
Selim G Akl, Frantisek Fiala, Waldemar W Koczkodaj
R1,577 Discovery Miles 15 770 Ships in 18 - 22 working days

This volume contains selected and invited papers presented at the International Conference on Computing and Information, ICCI '90, Niagara Falls, Ontario, Canada, May 23-26, 1990. ICCI conferences provide an international forum for presenting new results in research, development and applications in computing and information. Their primary goal is to promote an interchange of ideas and cooperation between practitioners and theorists in the interdisciplinary fields of computing, communication and information theory. The four main topic areas of ICCI '90 are: - Information and coding theory, statistics and probability, - Foundations of computer science, theory of algorithms and programming, - Concurrency, parallelism, communications, networking, computer architecture and VLSI, - Data and software engineering, databases, expert systems, information systems, decision making, and AI methodologies.

Information Security in Financial Services (Paperback, 1st ed. 1991): Ken Slater Information Security in Financial Services (Paperback, 1st ed. 1991)
Ken Slater
R2,928 Discovery Miles 29 280 Ships in 18 - 22 working days

Introduction - Risk and Vulnerability in the Financial Sector - The Security Policy - Personnel Security - Physical Security - Security of Computer Operations - Communications Security - Controlling the System - Secure System Development and Maintenance - Logical Access Security - Securing the Customer's Cash - If the Worst Happens: Disaster Recovery and Insurance - Microcomputer Security - Risk Analysis - Managing Security - The Auditor - Security Aspects of Compliance Reviews - Appendices - Glossary: The Language of Security

Modern Cryptology - A Tutorial (Paperback, 1988 ed.): Gilles Brassard Modern Cryptology - A Tutorial (Paperback, 1988 ed.)
Gilles Brassard
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computing power. Quantum crytography is based on the principles of quantum physics.

Advances in Cryptology - CRYPTO '89 - Proceedings (Paperback, 1990 ed.): Gilles Brassard Advances in Cryptology - CRYPTO '89 - Proceedings (Paperback, 1990 ed.)
Gilles Brassard
R1,618 Discovery Miles 16 180 Ships in 18 - 22 working days

CRYPTO is a conference devoted to all aspects of cryptologic research. It is held each year at the University of California at Santa Barbara. Annual meetings on this topic also take place in Europe and are regularly published in this Lecture Notes series under the name of EUROCRYPT. This volume presents the proceedings of the ninth CRYPTO meeting. The papers are organized into sections with the following themes: Why is cryptography harder than it looks?, pseudo-randomness and sequences, cryptanalysis and implementation, signature and authentication, threshold schemes and key management, key distribution and network security, fast computation, odds and ends, zero-knowledge and oblivious transfer, multiparty computation.

Advances in Cryptology - CRYPTO '88 - Proceedings (Paperback, 1990 ed.): Shafi Goldwasser Advances in Cryptology - CRYPTO '88 - Proceedings (Paperback, 1990 ed.)
Shafi Goldwasser
R1,662 Discovery Miles 16 620 Ships in 18 - 22 working days

The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography, Iicld August 21-2, j. 19SS in Sarita Uarbara, ('alifornia. The conference was sponsored hy the Int- national AssociatioIi for C'ryptologic Research (IAC'R) and hosted by the computer science depart incnt at the llniversity of California at Sarita D- ha ra . 'rile 4-1 papers presented hcrc coniprise: 35 papers selected from 61 - tcwded abstracts subniittctl in response to the call for papcrs, 1 invitcd prv sentations, and 6 papers sclccted from a large niiiii1, cr of informal UIIIJ) sewion present at ionc. The papers wcrc chosen by the program committee on the lja\is of tlic perceived originality, quality and relevance to the field of cryptography of the cxtcndcd allst ract5 suhriiitted. 'I'hc su1, missioris wv riot otlierwise rc.fcrcc(l. a id ofteri rcprescnt prcliininary reports on continuing rcscarc.11. It is a pleasure to tharik many colleagues. Ilarold Iredrickscri sing- made CRJ'PTO '88 a successful realit, y. Eric Dacli, Pad Ijnrret. haridedly Tom Bersori, Gilles Brassard, Ocled Goldreich, Andrew Odlyzko. C'liarles Rackoff arid Ron Rivest did excellerit work on the program comrriittcc in piittirig the technical program together, assisted by kind outsick reviekvers.

Digital Communication (Paperback, Softcover reprint of the original 1st ed. 1988): Edward A. Lee, David G Messerschmitt Digital Communication (Paperback, Softcover reprint of the original 1st ed. 1988)
Edward A. Lee, David G Messerschmitt
R2,762 Discovery Miles 27 620 Ships in 18 - 22 working days

This book concerns digital communication. Specifically, we treat the transport of bit streams from one geographical location to another over various physical media, such as wire pairs, coaxial cable, optical fiber, and radio waves. Further, we cover the mul tiplexing, multiple access, and synchronization issues relevant to constructing com munication networks that simultaneously transport bit streams from many users. The material in this book is thus directly relevant to the design of a multitude of digital communication systems, including for example local and metropolitan area data net works, voice and video telephony systems, the integrated services digital network (ISDN), computer communication systems, voiceband data modems, and satellite communication systems. We extract the common principles underlying these and other applications and present them in a unified framework. This book is intended for designers and would-be designers of digital communication systems. To limit the scope to manageable proportions we have had to be selective in the topics covered and in the depth of coverage. In the case of advanced information, coding, and detection theory, for example, we have not tried to duplicate the in-depth coverage of many advanced textbooks, but rather have tried to cover those aspects directly relevant to the design of digital communication systems."

Coding Theory and Applications - 3rd International Colloquium, Toulon, France, November 2-4, 1988. Proceedings (Paperback, 1989... Coding Theory and Applications - 3rd International Colloquium, Toulon, France, November 2-4, 1988. Proceedings (Paperback, 1989 ed.)
Gerard Daniel Cohen, Jacques Wolfmann
R1,521 Discovery Miles 15 210 Ships in 18 - 22 working days

This book contains a selection of papers presented at a Symposium on coding theory: "3 Journees sur le Codage," held November 24-26, 1986, in Cachan near Paris, France. It gives an account of the state of the art of research in France on Coding, ranging from rather theoretical topics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and implementation of coding algorithms on microcomputers. The symposium was the second one of this type. With its broad spectrum, it was a unique opportunity for contacts between university and industry on the topics of information and coding theory.

Coding Theory and Applications - 2nd International Colloquium, Cachan-Paris, France, November 24-26, 1986. Proceedings... Coding Theory and Applications - 2nd International Colloquium, Cachan-Paris, France, November 24-26, 1986. Proceedings (Paperback, 1988 ed.)
Gerard Daniel Cohen, Philippe Godlewski
R1,450 Discovery Miles 14 500 Ships in 18 - 22 working days

This book contains a selection of papers presented at a Symposium on coding theory: "3 Journ es sur le Codage," held November 24-26, 1986, in Cachan near Paris, France. It gives an account of the state of the art of research in France on Coding, ranging from rather theoretical topics like algebraic geometry and combinatorial coding to applications like modulation, real-space decoding and implementation of coding algorithms on microcomputers. The symposium was the second one of this type. With its broad spectrum, it was a unique opportunity for contacts between university and industry on the topics of information and coding theory.

Advances in Cryptology - CRYPTO '86 - Proceedings (Paperback, 1987 ed.): Andrew M. Odlyzko Advances in Cryptology - CRYPTO '86 - Proceedings (Paperback, 1987 ed.)
Andrew M. Odlyzko
R1,948 Discovery Miles 19 480 Ships in 18 - 22 working days

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara. The first conference in this series, CRYPTO 81, organized by A. Gersho, did not have a formal proceedings. The proceedings of the following four conferences in this series have been published as: Advances in Cryptology: Proceedings of Crypto 82, D. Chaum, R. L. Rivest, and A. T. Sherman, eds., Plenum, 1983. Advances in Cryptology: Proceedings of Crypto 83, D. Chaum, ed., Plenum, 1984. Advances in Cryptology: Proceedings of CRYPTO 84, G. R. Blakley and D. Chaum, eds., Lecture Notes in Computer Science #196, Springer, 1985. Advances in Cryptology - CRYPTO '85 Proceedings, H. C. Williams, ed., Lecture Notes in Computer Science #218, Springer, 1986. A parallel series of conferences is held annually in Europe. The first of these had its proceedings published as Cryptography: Proceedings, Burg Feuerstein 1982, T. Beth, ed., Lecture Notes in Computer Science #149, Springer, 1983.

Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021): Shuangbao Paul Wang Computer Architecture and Organization - Fundamentals and Architecture Security (Paperback, 1st ed. 2021)
Shuangbao Paul Wang
R1,561 Discovery Miles 15 610 Ships in 10 - 15 working days

In today's workplace, computer and cybersecurity professionals must understand both hardware and software to deploy effective security solutions. This book introduces readers to the fundamentals of computer architecture and organization for security, and provides them with both theoretical and practical solutions to design and implement secure computer systems. Offering an in-depth and innovative introduction to modern computer systems and patent-pending technologies in computer security, the text integrates design considerations with hands-on lessons learned to help practitioners design computer systems that are immune from attacks. Studying computer architecture and organization from a security perspective is a new area. There are many books on computer architectures and many others on computer security. However, books introducing computer architecture and organization with security as the main focus are still rare. This book addresses not only how to secure computer components (CPU, Memory, I/O, and network) but also how to secure data and the computer system as a whole. It also incorporates experiences from the author's recent award-winning teaching and research. The book also introduces the latest technologies, such as trusted computing, RISC-V, QEMU, cache security, virtualization, cloud computing, IoT, and quantum computing, as well as other advanced computing topics into the classroom in order to close the gap in workforce development. The book is chiefly intended for undergraduate and graduate students in computer architecture and computer organization, as well as engineers, researchers, cybersecurity professionals, and middleware designers.

Datenschutz und Datensicherung im Wandel der Informationstechnologien - 1.GI-Fachtagung Munchen, 30. und 31. Oktober 1985... Datenschutz und Datensicherung im Wandel der Informationstechnologien - 1.GI-Fachtagung Munchen, 30. und 31. Oktober 1985 Proceedings (English, German, Paperback)
P. P. Spies
R1,749 Discovery Miles 17 490 Ships in 18 - 22 working days

Der Arbeitskreis "Datenschutz und Datensicherung" des Prasidiums der Gesellschaft fur In- formatik sieht es als seine Aufgabe an, Probleme des Datenschutzes und der Datensicherung aus der Sicht der Informatik zu behandeln. Er hat in diesem Rahmen grundsatzliche Aus- sagen zu diesen Themen unter besonderer Berucksichtigung der sich rasch entwickelnden In- formationstechnologien erarbeitet und zu Entwurfen fur Anderungen des Bundesdatenschutz- gesetzes Stellung genommen. Aus dieser Tatigkeit heraus entstand der Plan zur Durchfuh- rung einer Fachtagung mit dem Thema "Datenschutz und Datensicherung im Wandel der Informationstechnologien". Diese Tagung, deren Beitrage dieser Band enthalt, findet am 30. und 31. Oktober 1985 im Rahmen der SYSTEMS 85 statt. Sie soll die Datenschutz- und Datensicherungs-Probleme, die mit den wachsenden technologischen Moglichkeiten entstehen, aus der Sicht der Informa- tionstechnik beleuchten. Sie soll Methoden, Verfahren und Hilfsmittel aufzeigen, mit denen die Datenschutz- und Datensicherungs-Probleme konstruktiv einer Losung naher gebracht werden konnen. Sie soll Anwender von Rechensystemen und Kommunikationsnetzen, Juristen und Informatiker dazu anregen, gemeinsam uber Datenschutz- und Datensicherungs-Probleme nachzudenken und miteinander Losungen dieser Probleme zu erarbeiten.

Advances in Cryptology - Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques -... Advances in Cryptology - Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 (Paperback, 1985 ed.)
Thomas Beth, Norbert Cot, Ingemar Ingemarsson
R1,944 Discovery Miles 19 440 Ships in 18 - 22 working days

This book contains the proceedings of EUROCRYPT 85, held in Paris in 1984, April 9-11, at the University of Paris, Sorbonne. EIJROCRYPT is now an annual international European meeting in cryptology, intended primarily for the international of researchers in this area. EUROCRYPT 84 was community following previous meetings held at Burg Feuerstein in 1982 and at IJdine in 1983. In fact EUROCRYPT 84 was thc first such meeting being organized under IXCR (International Association of Cryptology Research). Other sponsors were the well-known French association on cybernetics research AFCET, the LITP (Laborstoire d' Informntique thcorique called et de Programmation), which is a laboratory of computer science associated with CNRS, and the department of mathematics and computer science at the Ilniversity RenE Descartcs, Sorbonne. EUROCRYPT 83 was very successfull, with about 180 participants from a great variety of foreign countries and 50 papers addressing all aspects of cryptology, close to applied as well as theoretical. It also had a special feature, i.e. a special session on smart cards particularly welcome at the time, since France was then carrying on an ambitious program on smart cards. EUROCRYPT 84 was a great experience. We like to thank all the sponsors and all the authors for their submission of papers. Pakin, Decemben 74ti4. CONTENTS SECTION I: GENERAL THEORY, CLASSICAL METHODS 3 Cryptology and Complexity Theories ............................ G. RLiGGTU 1 0 On Cryptosystems based on Folynomials md I'inite Fields.. ..... R. irvi 16 Algehraical Structures of Cryptographic lransformations.. .....

Feedback Shift Registers (Paperback, 1984 ed.): Christian Ronse Feedback Shift Registers (Paperback, 1984 ed.)
Christian Ronse
R690 Discovery Miles 6 900 Ships in 18 - 22 working days
Advances in Cryptology - Proceedings of CRYPTO '84 (Paperback, 1985 ed.): G. R Blakely, D. Chaum Advances in Cryptology - Proceedings of CRYPTO '84 (Paperback, 1985 ed.)
G. R Blakely, D. Chaum
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

Recently, there has been a lot of interest in provably "good" pseudo-random number generators [lo, 4, 14, 31. These cryptographically secure generators are "good" in the sense that they pass all probabilistic polynomial time statistical tests. However, despite these nice properties, the secure generators known so far suffer from the han- cap of being inefiicient; the most efiicient of these take n2 steps (one modular multip- cation, n being the length of the seed) to generate one bit. Pseudc-random number g- erators that are currently used in practice output n bits per multiplication (n2 steps). An important open problem was to output even two bits on each multiplication in a cryptographically secure way. This problem was stated by Blum, Blum & Shub [3] in the context of their z2 mod N generator. They further ask: how many bits can be o- put per multiplication, maintaining cryptographic security? In this paper we state a simple condition, the XOR-Condition and show that any generator satisfying this condition can output logn bits on each multiplication. We show that the XOR-Condition is satisfied by the lop least significant bits of the z2-mod N generator. The security of the z2 mod N generator was based on Quadratic Residu- ity [3]. This generator is an example of a Trapdoor Generator [13], and its trapdoor properties have been used in protocol design. We strengthen the security of this gene- tor by proving it as hard as factoring.

Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983... Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983 ed.)
T. Beth
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, modern cryptography has become a central topic of research in all areas of communication science. Definitions (cf. Bauer pp. 31 - 48) Cryptographic measures are applied to p- tect valuable data during transmission against unwanted interception INTERCEPTOR Fig. A: passive violation and (possibly undectable) forgery . Fig. 2: acti-se violation In accordance with the subsequent paper of Bauer (pp. 31 - 481, the technique applied to meet these requirements is called en- tion. In this process the transmitter enciphers (or encrypts) a plaintext message into a ciphertext. 4 ciphertexc ciphering Fig. 3: The Wire-tap-channel This transformation is called a cipher(function) which the au- rized receiver deciphers (decrypts). An enemy is a person or institution who wants illegal access to the messages. Assuming that the enemy can only get hold of the ciph- texts, he has to perform a cryptanalysis in order to reconstitute the plaintexts. To add to the difficulties for a cryptanalyst, the cipher functions are chosen to a varying parameter, called the key. A generator cryptosystem consists of a class of injective cipher functions ES: M-C, mapping plaintext messages(EM) into ciphertexts(EC) . The parameter s runs through the set K of keys. These formulations are best demonstrated by the basic, classical examples.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,705 Discovery Miles 47 050
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Ethereum - Understanding Blockchain…
Paul Paxton Hardcover R549 R503 Discovery Miles 5 030
Improving Image Quality in Visual…
Bin Yan, Yong Xiang, … Hardcover R2,653 Discovery Miles 26 530
The Multimedia Internet
Stephen Weinstein Hardcover R2,866 Discovery Miles 28 660
Discrete Mathematics with Cryptographic…
Alexander I Kheyfits Hardcover R1,852 R1,484 Discovery Miles 14 840
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Readings from CRYPTOLOGIA on the Enigma…
Brian J. Winkel, Cipher Deavors, … Hardcover R2,798 Discovery Miles 27 980
Information Security - Foundations…
Ali Ismail Awad, Michael Fairhurst Hardcover R3,433 R3,098 Discovery Miles 30 980

 

Partners