0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (20)
  • R250 - R500 (86)
  • R500+ (1,897)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983... Cryptography - Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982 (Paperback, 1983 ed.)
T. Beth
R1,557 Discovery Miles 15 570 Ships in 18 - 22 working days

T. Beth (Ed.): Cryptography - EUROCRYPT '82, LNCS 149, pp. 1-28, 1983. 0 Springer-Verlag Berlin Heidelberg 1983 3 Having all of a sudden left the shady corner of semi-military art, modern cryptography has become a central topic of research in all areas of communication science. Definitions (cf. Bauer pp. 31 - 48) Cryptographic measures are applied to p- tect valuable data during transmission against unwanted interception INTERCEPTOR Fig. A: passive violation and (possibly undectable) forgery . Fig. 2: acti-se violation In accordance with the subsequent paper of Bauer (pp. 31 - 481, the technique applied to meet these requirements is called en- tion. In this process the transmitter enciphers (or encrypts) a plaintext message into a ciphertext. 4 ciphertexc ciphering Fig. 3: The Wire-tap-channel This transformation is called a cipher(function) which the au- rized receiver deciphers (decrypts). An enemy is a person or institution who wants illegal access to the messages. Assuming that the enemy can only get hold of the ciph- texts, he has to perform a cryptanalysis in order to reconstitute the plaintexts. To add to the difficulties for a cryptanalyst, the cipher functions are chosen to a varying parameter, called the key. A generator cryptosystem consists of a class of injective cipher functions ES: M-C, mapping plaintext messages(EM) into ciphertexts(EC) . The parameter s runs through the set K of keys. These formulations are best demonstrated by the basic, classical examples.

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Hardcover, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,205 Discovery Miles 12 050 Ships in 9 - 17 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December... Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Lejla Batina, Stjepan Picek, Mainack Mondal
R1,797 R1,694 Discovery Miles 16 940 Save R103 (6%) Ships in 9 - 17 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022 held in Jaipur, India, during December 9-12, 2022. The 18 full papers included in this book were carefully reviewed and selected from 61 submissions. They were organized in topical sections as follows: symmetric cryptography; public-key cryptography, post-quantum cryptography, zero knowledge proofs; hardware security and AI; and network security, authentication, and privacy.

Algebraic Coding Theory and Applications (Paperback, 1979 ed.): Carlos R. P. Hartmann, Giuseppe Longo Algebraic Coding Theory and Applications (Paperback, 1979 ed.)
Carlos R. P. Hartmann, Giuseppe Longo
R1,494 Discovery Miles 14 940 Ships in 18 - 22 working days
An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition): James Kraft, Lawrence Washington An Introduction to Number Theory with Cryptography (Hardcover, 2nd edition)
James Kraft, Lawrence Washington
R3,678 Discovery Miles 36 780 Ships in 10 - 15 working days

Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing popularity. The book is designed to be used by sophomore, junior, and senior undergraduates, but it is also accessible to advanced high school students and is appropriate for independent study. It includes a few more advanced topics for students who wish to explore beyond the traditional curriculum. Features of the second edition include Over 800 exercises, projects, and computer explorations Increased coverage of cryptography, including Vigenere, Stream, Transposition,and Block ciphers, along with RSA and discrete log-based systems "Check Your Understanding" questions for instant feedback to students New Appendices on "What is a proof?" and on Matrices Select basic (pre-RSA) cryptography now placed in an earlier chapter so that the topic can be covered right after the basic material on congruences Answers and hints for odd-numbered problems About the Authors: Jim Kraft received his Ph.D. from the University of Maryland in 1987 and has published several research papers in algebraic number theory. His previous teaching positions include the University of Rochester, St. Mary's College of California, and Ithaca College, and he has also worked in communications security. Dr. Kraft currently teaches mathematics at the Gilman School. Larry Washington received his Ph.D. from Princeton University in 1974 and has published extensively in number theory, including books on cryptography (with Wade Trappe), cyclotomic fields, and elliptic curves. Dr. Washington is currently Professor of Mathematics and Distinguished Scholar-Teacher at the University of Maryland.

Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.): I.... Channel Coding Theory - Course Held at the Department for Automation and Information, July 1970 (Paperback, 1970 ed.)
I. Csiszar
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days
The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback): Joshua Holden The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback)
Joshua Holden
R462 Discovery Miles 4 620 Ships in 18 - 22 working days

Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback): RA... Cryptography Apocalypse - Preparing for the Day When Quantum Computing Breaks Today's Crypto Edition 1 (Paperback)
RA Grimes
R764 R656 Discovery Miles 6 560 Save R108 (14%) Ships in 9 - 17 working days

Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for protecting users, data, and infrastructure in the digital age. Using traditional computing, even common desktop encryption could take decades for specialized 'crackers' to break and government and infrastructure-grade encryption would take billions of times longer. In light of these facts, it may seem that today's computer cryptography is a rock-solid way to safeguard everything from online passwords to the backbone of the entire internet. Unfortunately, many current cryptographic methods will soon be obsolete. In 2016, the National Institute of Standards and Technology (NIST) predicted that quantum computers will soon be able to break the most popular forms of public key cryptography. The encryption technologies we rely on every day--HTTPS, TLS, WiFi protection, VPNs, cryptocurrencies, PKI, digital certificates, smartcards, and most two-factor authentication--will be virtually useless. . . unless you prepare. Cryptography Apocalypse is a crucial resource for every IT and InfoSec professional for preparing for the coming quantum-computing revolution. Post-quantum crypto algorithms are already a reality, but implementation will take significant time and computing power. This practical guide helps IT leaders and implementers make the appropriate decisions today to meet the challenges of tomorrow. This important book: Gives a simple quantum mechanics primer Explains how quantum computing will break current cryptography Offers practical advice for preparing for a post-quantum world Presents the latest information on new cryptographic methods Describes the appropriate steps leaders must take to implement existing solutions to guard against quantum-computer security threats Cryptography Apocalypse: Preparing for the Day When Quantum Computing Breaks Today's Crypto is a must-have guide for anyone in the InfoSec world who needs to know if their security is ready for the day crypto break and how to fix it.

Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,388 R895 Discovery Miles 8 950 Save R493 (36%) Ships in 9 - 17 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

New Directions of Modern Cryptography (Hardcover): Zhenfu Cao New Directions of Modern Cryptography (Hardcover)
Zhenfu Cao
R3,534 Discovery Miles 35 340 Ships in 10 - 15 working days

Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern Cryptography presents general principles and application paradigms critical to the future of this field. The study of cryptography is motivated by and driven forward by security requirements. All the new directions of modern cryptography, including proxy re-cryptography, attribute-based cryptography, batch cryptography, and noncommutative cryptography have arisen from these requirements. Focusing on these four kinds of cryptography, this volume presents the fundamental definitions, precise assumptions, and rigorous security proofs of cryptographic primitives and related protocols. It also describes how they originated from security requirements and how they are applied. The book provides vivid demonstrations of how modern cryptographic techniques can be used to solve security problems. The applications cover wired and wireless communication networks, satellite communication networks, multicast/broadcast and TV networks, and newly emerging networks. It also describes some open problems that challenge the new directions of modern cryptography. This volume is an essential resource for cryptographers and practitioners of network security, security researchers and engineers, and those responsible for designing and developing secure network systems.

Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.): P. Herbig Kanalcodierung - Grundlagen und Anwendungen in modernen Kommunikationssystemen (German, Hardcover, 1996 ed.)
P. Herbig; Bernd Friedrichs
R2,947 Discovery Miles 29 470 Ships in 18 - 22 working days

Seit der Begriindung der Informations- und Codierungstheorie durch die Ar beiten von Claude E. Shannon sind fast fiinf Jahrzehnte vergangen. In diesem Zeitraum hat sich die Kanalcodierung von einer rein theoretischen Disziplin zu einer ausgedehnten anwendungsorientierten Wissenschaft entwickelt. In fast allen modernen und leistungsfahigen Systemen zur Nachrichteniibertragung oder Nachrichtenspeicherung stellt die Kanalcodierung heute einen zentralen und pragenden Baustein dar. Mit der Compact Disc und mit Modems zur Dateniibertragung dringen Codierungsverfahren inzwischen auch in die privat genutzte Elektronik vor. Durch Kanalcodierung kann die Ubertragungsqualitat enorm gesteigert werden und gleichzeitig kommen die Ubertragungsverfahren mit weniger Sen deleistung und teilweise auch mit weniger Bandbreite aus. Diese Vorteile miissen nicht mit einer Reduktion der Datenrate bezahlt werden, sondern nur mit einem erh6hten Aufwand an digitaler Signalverarbeitung in Sender und Empfanger. Die Codierungstheorie liefert Resultate zur Struktur und zu den Eigenschaften von Codes sowie effiziente und aufwandsgiinstige Verfahren zur Decodierung. Zusammen mit der hochintegrierten Schaltungstechnik, die im mer leistungsfahiger und kostengiinstiger wird, fiihren die Fortschritte in der Kanalcodierung zu einer standigen Weiterentwicklung der Ubertragungsver fahren sowie zu einer effizienteren Nutzung der UbertragungskanaIe."

Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Paperback)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R1,840 Discovery Miles 18 400 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition): Keith Martin Everyday Cryptography - Fundamental Principles and Applications (Paperback, 2nd Revised edition)
Keith Martin
R1,776 Discovery Miles 17 760 Ships in 9 - 17 working days

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin. This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications. By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this. A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Decentralized Applications (Paperback): Siraj Raval Decentralized Applications (Paperback)
Siraj Raval
R824 R707 Discovery Miles 7 070 Save R117 (14%) Ships in 18 - 22 working days

Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications known as dapps. In this practical guide, author Siraj Raval explains why dapps will become more widely used-and profitable-than today's most popular web apps. You'll learn how the blockchain's cryptographically stored ledger, scarce-asset model, and peer-to-peer (P2P) technology provide a more flexible, better-incentivized structure than current software models. Once you understand the theory behind dapps and what a thriving dapp ecosystem looks like, Raval shows you how to use existing tools to create a working dapp. You'll then take a deep dive into the OpenBazaar decentralized market, and examine two case studies of successful dapps currently in use. Learn advances in distributed-system technology that make distributed data, wealth, identity, computing, and bandwidth possible Build a Twitter clone with the Go language, distributed architecture, decentralized messaging app, and peer-to-peer data store Learn about OpenBazaar's decentralized market and its structure for supporting transactions Explore Lighthouse, a decentralized crowdfunding project that rivals sites such as Kickstarter and IndieGogo Take an in-depth look at La'Zooz, a P2P ridesharing app that transmits data directly between riders and drivers

Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023):... Modern Cryptography Volume 2 - A Classical Introduction to Informational and Mathematical Principle (Paperback, 1st ed. 2023)
Zhiyong Zheng, Kun Tian, Fengxia Liu
R1,021 Discovery Miles 10 210 Ships in 10 - 15 working days

This open access book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that post-quantum ciphers focus on the implementation of encryption and decryption algorithms, but the theoretical proof is insufficient. In Chapter 3, Chapter 4 and Chapter 6, author introduces the theory and technology of LWE distribution, LWE cipher and homomorphic encryption in detail. When using random analysis tools, there is a problem of "ambiguity" in both definition and algorithm. The greatest feature of this book is to use probability distribution to carry out rigorous mathematical definition and mathematical demonstration for various unclear or imprecise expressions, so as to make it a rigorous theoretical system for classroom teaching and dissemination. Chapters 5 and 7 further expand and improve the theory of cyclic lattice, ideal lattice and generalized NTRU cryptography. This book is used as a professional book for graduate students majoring in mathematics and cryptography, as well as a reference book for scientific and technological personnel engaged in cryptography research.

Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover): Neeraj Kumar, N. Gayathri, B. Balamurugan, Md... Blockchain, Big Data and Machine Learning - Trends and Applications (Hardcover)
Neeraj Kumar, N. Gayathri, B. Balamurugan, Md Arafatur Rahman
R4,501 Discovery Miles 45 010 Ships in 10 - 15 working days

Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.

Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl.... Systemtheorie - Methoden und Anwendungen fur ein- und mehrdimensionale Systeme (German, Hardcover, 3., neubearb. u. erw. Aufl. 1995)
Hans Marko
R3,502 Discovery Miles 35 020 Ships in 18 - 22 working days

Dieser Klassiker der Systemtheorie wurde auf den neuesten Stand gebracht und um ein Kapitel uber mehrdimensionale Systeme erweitert. Zentrales Thema ist die grundlegende und umfassende Darstellung der Behandlung linearer Systeme mittels Spektraltransformationen. Diese mussen nicht nachrichten-, informations-, oder regelungstechnischer, sondern konnen z.B. auch biologischer Natur sein.
Auf eine kompakte Darstellung wurde besonderer Wert gelegt, die Anspruche an die Mathematikkenntnisse des Lesers sind gering. Das Buch ist somit sowohl als Nachschlagewerk als auch zum Lernen geeignet."

Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected... Socio-Technical Aspects in Security - 11th International Workshop, STAST 2021, Virtual Event, October 8, 2021, Revised Selected Papers (Paperback, 1st ed. 2022)
Simon Parkin, Luca Vigano
R1,678 Discovery Miles 16 780 Ships in 10 - 15 working days

This book constitutes revised selected papers from the refereed conference proceedings of the 11th International Workshop on Socio-Technical Aspects in Security and Trust, STAST 2021, held in conjunction with ESORICS, the European Symposium on Research in Computer Security, as a virtual event, in October 2021. The 10 full papers included in this book were carefully reviewed and selected from 25 submissions. They were organized in topical sections as follows: web and apps; context and modelling; and from the present to the future.

CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition): Ge Clarke CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition)
Ge Clarke
R1,126 R846 Discovery Miles 8 460 Save R280 (25%) Ships in 9 - 17 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022):... Proceedings of International Conference on Network Security and Blockchain Technology - ICNSBT 2021 (Paperback, 1st ed. 2022)
Debasis Giri, Jyotsna Kumar Mandal, Kouichi Sakurai, Debashis De
R5,368 Discovery Miles 53 680 Ships in 10 - 15 working days

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India-Kolkata Chapter, India, during December 2-4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Practical Cryptography - Algorithms and Implementations Using C++ (Paperback): Saiful Azad, Al-Sakib Khan Pathan Practical Cryptography - Algorithms and Implementations Using C++ (Paperback)
Saiful Azad, Al-Sakib Khan Pathan
R1,880 Discovery Miles 18 800 Ships in 10 - 15 working days

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an increased reliance on cryptography. This book discusses the theories and concepts behind modern cryptography and demonstrates how to develop and implement cryptographic algorithms using C++ programming language. Written for programmers and engineers, Practical Cryptography explains how you can use cryptography to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this book shows you how to build security into your computer applications, networks, and storage. Suitable for undergraduate and postgraduate students in cryptography, network security, and other security-related courses, this book will also help anyone involved in computer and network security who wants to learn the nuts and bolts of practical cryptography.

RC4 Stream Cipher and Its Variants (Paperback): Goutam Paul, Subhamoy Maitra RC4 Stream Cipher and Its Variants (Paperback)
Goutam Paul, Subhamoy Maitra
R2,042 Discovery Miles 20 420 Ships in 10 - 15 working days

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4. With open research problems in each chapter, this book offers a complete account of the most current research on RC4.

Network Coding and Subspace Designs (Hardcover, 1st ed. 2018): Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein,... Network Coding and Subspace Designs (Hardcover, 1st ed. 2018)
Marcus Greferath, Mario Osvin Pavcevic, Natalia Silberstein, Maria Angeles Vazquez-Castro
R3,631 R2,515 Discovery Miles 25 150 Save R1,116 (31%) Ships in 10 - 15 working days

This book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.

Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021):... Quantum Algorithms for Cryptographically Significant Boolean Functions - An IBMQ Experience (Paperback, 1st ed. 2021)
Tharrmashastha SAPV, Debajyoti Bera, Arpita Maitra, Subhamoy Maitra
R1,668 Discovery Miles 16 680 Ships in 10 - 15 working days

This book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch-Jozsa and Walsh spectrum, Grover's algorithm, Simon's algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable.

Boolean Functions for Cryptography and Coding Theory (Hardcover): Claude Carlet Boolean Functions for Cryptography and Coding Theory (Hardcover)
Claude Carlet
R2,194 Discovery Miles 21 940 Ships in 10 - 15 working days

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Transcription Factors
Manfred Gossen, Joerg Kaufmann, … Hardcover R7,762 Discovery Miles 77 620
Mechanisms of DNA Recombination and…
Maria Spies, Anna Malkova Hardcover R4,526 Discovery Miles 45 260
Twin Research for Everyone - From…
Adam D. Tarnoki, David L. Tarnoki, … Paperback R3,606 Discovery Miles 36 060
The Mendelian Revolution - The Emergence…
Peter J. Bowler Hardcover R4,632 Discovery Miles 46 320
Darwin's Pangenesis and Its Rediscovery…
Dhavendra Kumar Hardcover R3,710 Discovery Miles 37 100
Darwin's Pangenesis and Its Rediscovery…
Dhavendra Kumar Hardcover R3,710 Discovery Miles 37 100
Biophysical approaches to translational…
Jonathan D. Dinman Hardcover R4,049 Discovery Miles 40 490
Methods of Microarray Data Analysis V
Patrick McConnell, Simon Lin, … Hardcover R2,750 Discovery Miles 27 500
Molecular Manufacturing
Sergei Vakula Hardcover R4,137 Discovery Miles 41 370
Human Genes and Genomes - Science…
Leon Rosenberg, Diane Rosenberg Hardcover R2,049 R1,893 Discovery Miles 18 930

 

Partners