0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (85)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December... Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,797 R1,694 Discovery Miles 16 940 Save R103 (6%) Ships in 9 - 17 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.

Algebraic Coding Theory and Applications (Paperback, 1979 ed.): Carlos R. P. Hartmann, Giuseppe Longo Algebraic Coding Theory and Applications (Paperback, 1979 ed.)
Carlos R. P. Hartmann, Giuseppe Longo
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days
An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition)
James Kraft, Lawrence Washington
R3,678 Discovery Miles 36 780 Ships in 10 - 15 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.): I.... Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.)
I. Csiszar
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days
Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,388 R895 Discovery Miles 8 950 Save R493 (36%) Ships in 9 - 17 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

New Directions of Modern Cryptography (Hardcover): Zhenfu Cao New Directions of Modern Cryptography (Hardcover)
Zhenfu Cao
R3,534 Discovery Miles 35 340 Ships in 10 - 15 working days

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.): P. Herbig Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.)
P. Herbig; Bernd Friedrichs
R2,947 Discovery Miles 29 470 Ships in 18 - 22 working days

Seit der Begriindung der Informations- und Codierungstheorie durch die Ar beiten von Claude E. Shannon sind fast fiinf Jahrzehnte vergangen. In diesem Zeitraum hat sich die Kanalcodierung von einer rein theoretischen Disziplin zu einer ausgedehnten anwendungsorientierten Wissenschaft entwickelt. In fast allen modernen und leistungsfahigen Systemen zur Nachrichteniibertragung oder Nachrichtenspeicherung stellt die Kanalcodierung heute einen zentralen und pragenden Baustein dar. Mit der Compact Disc und mit Modems zur Dateniibertragung dringen Codierungsverfahren inzwischen auch in die privat genutzte Elektronik vor. Durch Kanalcodierung kann die Ubertragungsqualitat enorm gesteigert werden und gleichzeitig kommen die Ubertragungsverfahren mit weniger Sen deleistung und teilweise auch mit weniger Bandbreite aus. Diese Vorteile miissen nicht mit einer Reduktion der Datenrate bezahlt werden, sondern nur mit einem erh6hten Aufwand an digitaler Signalverarbeitung in Sender und Empfanger. Die Codierungstheorie liefert Resultate zur Struktur und zu den Eigenschaften von Codes sowie effiziente und aufwandsgiinstige Verfahren zur Decodierung. Zusammen mit der hochintegrierten Schaltungstechnik, die im mer leistungsfahiger und kostengiinstiger wird, fiihren die Fortschritte in der Kanalcodierung zu einer standigen Weiterentwicklung der Ubertragungsver fahren sowie zu einer effizienteren Nutzung der UbertragungskanaIe."

Boolean Functions for Cryptography and Coding Theory (Hardcover): Claude Carlet Boolean Functions for Cryptography and Coding Theory (Hardcover)
Claude Carlet
R2,194 Discovery Miles 21 940 Ships in 10 - 15 working days

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.

Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R1,840 Discovery Miles 18 400 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback): Adam Anderson, Tom Gilkeson Small Business Cyber Security - Your Customers Can Trust You...Right? (Paperback)
Adam Anderson, Tom Gilkeson
R340 R318 Discovery Miles 3 180 Save R22 (6%) Ships in 18 - 22 working days
Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,776 Discovery Miles 17 760 Ships in 9 - 17 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R824 R707 Discovery Miles 7 070 Save R117 (14%) Ships in 18 - 22 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl.... Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl. 1995)
Hans Marko
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Dieser Klassiker der Systemtheorie wurde auf den neuesten Stand gebracht und um ein Kapitel uber mehrdimensionale Systeme erweitert. Zentrales Thema ist die grundlegende und umfassende Darstellung der Behandlung linearer Systeme mittels Spektraltransformationen. Diese mussen nicht nachrichten-, informations-, oder regelungstechnischer, sondern konnen z.B. auch biologischer Natur sein.
Auf eine kompakte Darstellung wurde besonderer Wert gelegt, die Anspruche an die Mathematikkenntnisse des Lesers sind gering. Das Buch ist somit sowohl als Nachschlagewerk als auch zum Lernen geeignet."

Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected... Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Simon Parkin, Luca Vigano
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.

CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition): Ge Clarke CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition)
Ge Clarke
R1,126 R846 Discovery Miles 8 460 Save R280 (25%) Ships in 9 - 17 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022):... Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022)
Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De
R5,368 Discovery Miles 53 680 Ships in 10 - 15 working days

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Quantum Information Processing - Theory and Implementation (Paperback, 2nd ed. 2021): Janos A. Bergou, Mark Hillery, Mark... Quantum Information Processing - Theory and Implementation (Paperback, 2nd ed. 2021)
Janos A. Bergou, Mark Hillery, Mark Saffman
R1,713 R1,558 Discovery Miles 15 580 Save R155 (9%) Ships in 10 - 15 working days

This new edition of a well-received textbook provides a concise introduction to both the theoretical and experimental aspects of quantum information at the graduate level. While the previous edition focused on theory, the book now incorporates discussions of experimental platforms. Several chapters on experimental implementations of quantum information protocols have been added: implementations using neutral atoms, trapped ions, optics, and solidstate systems are each presented in its own chapter. Previous chapters on entanglement, quantum measurements, quantum dynamics, quantum cryptography, and quantum algorithms have been thoroughly updated, and new additions include chapters on the stabilizer formalism and the Gottesman-Knill theorem as well as aspects of classical and quantum information theory. To facilitate learning, each chapter starts with a clear motivation to the topic and closes with exercises and a recommended reading list. Quantum Information Processing: Theory and Implementation will be essential to graduate students studying quantum information as well as and researchers in other areas of physics who wish to gain knowledge in the field.

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R2,042 Discovery Miles 20 420 Ships in 10 - 15 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Practical Cryptography - Algorithms and Implementations Using C++ (Paperback): Saiful Azad, Al-Sakib Khan Pathan Practical Cryptography - Algorithms and Implementations Using C++ (Paperback)
Saiful Azad, Al-Sakib Khan Pathan
R1,880 Discovery Miles 18 800 Ships in 10 - 15 working days

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.

Network Coding and Subspace Designs (Hardcover, 1st ed. 2018): Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein,... Network Coding and Subspace Designs (Hardcover, 1st ed. 2018)
Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein, Maria Angeles Vazquez-Castro
R3,631 R2,515 Discovery Miles 25 150 Save R1,116 (31%) Ships in 10 - 15 working days

This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.

Cracking Codes and Cryptograms For Dummies (Paperback): D. Sutherland Cracking Codes and Cryptograms For Dummies (Paperback)
D. Sutherland 1
R239 R194 Discovery Miles 1 940 Save R45 (19%) Ships in 9 - 17 working days

The fast and easy way to crack codes and cryptograms

Did you love Dan Brown's "The Lost Symbol"? Are you fascinated by secret codes and deciphering lost history? "Cracking Codes and Cryptograms For Dummies" shows you how to think like a symbologist to uncover mysteries and history by solving cryptograms and cracking codes that relate to Freemasonry, the Knights Templar, the Illuminati, and other secret societies and conspiracy theories.

You'll get easy-to-follow instructions for solving everything from the simplest puzzles to fiendishly difficult ciphers using secret codes and lost symbols.Over 350 handcrafted cryptograms and ciphers of varying typesTips and tricks for cracking even the toughest codeSutherland is a syndicated puzzle author; Koltko-Rivera is an expert on the major symbols and ceremonies of Freemasonry

With the helpful information in this friendly guide, you'll be unveiling mysteries and shedding light on history in no time!

Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback): Keith Martin Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Paperback)
Keith Martin
R400 Discovery Miles 4 000 Ships in 9 - 17 working days

Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised... Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Sabu M. Thampi, Guojun Wang, Danda B. Rawat, Ryan Ko, Chun I. Fan
R1,295 Discovery Miles 12 950 Ships in 10 - 15 working days

This book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,668 R1,275 Discovery Miles 12 750 Save R393 (24%) Ships in 10 - 15 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptocurrency for Beginners - How to…
Zeph Pascall Hardcover R761 Discovery Miles 7 610
Probability, Random Processes, and…
Robert M. Gray Hardcover R4,383 Discovery Miles 43 830
New Research on the Voynich Manuscript…
National Security Agency Hardcover R539 Discovery Miles 5 390
Computer & Internet Security - A…
Wenliang Du Hardcover R1,874 Discovery Miles 18 740
Technical Articles about the Voynich…
National Security Agency Hardcover R597 Discovery Miles 5 970
Metaverse - A Beginner's Guide to…
Harper Fraley Hardcover R778 R682 Discovery Miles 6 820
Discrete Mathematics with Cryptographic…
Alexander I Kheyfits Hardcover R1,852 R1,484 Discovery Miles 14 840
Providing Sound Foundations for…
Oded Goldreich Hardcover R3,016 Discovery Miles 30 160
Radical transparency and digital…
Luke Heemsbergen Hardcover R2,676 Discovery Miles 26 760
Performances of Peace: Utrecht 1713
Renger Bruin, Cornelis Haven, … Hardcover R4,705 Discovery Miles 47 050

 

Partners