0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • R2,500 - R5,000 (7)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Wireless Security and Cryptography - Specifications and Implementations (Hardcover): Nicolas Sklavos, Xinmiao Zhang Wireless Security and Cryptography - Specifications and Implementations (Hardcover)
Nicolas Sklavos, Xinmiao Zhang; Contributions by Odysseas Koufopavlou, Vesna Hassler, Paris Kitsos, …
R4,620 Discovery Miles 46 200 Ships in 12 - 17 working days

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Paperback, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R4,741 Discovery Miles 47 410 Ships in 10 - 15 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised... Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
R1,616 Discovery Miles 16 160 Ships in 10 - 15 working days

The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was held at the University of Calgary,in Calgary, Alberta, Canada, during August 13-14, 2009. There were 74 participants from 19 countries. Previous workshops in this series were held at Queens University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton University in Ottawa (1995, 1997, and 2003), University of - terloo (2000 and 2004), Fields Institute in Toronto (2001), Memorial University of Newfoundland in St. Johns (2002), Concordia University in Montreal (2006), University of Ottawa (2007), and Mount Allison University in Sackville (2008). The themes for SAC 2009 were: 1. Design and analysis of symmetric key primitives and cryptosystems, incl- ing block and stream ciphers, hash functions, and MAC algorithms 2. E?cient implementations of symmetric and public key algorithms 3. Mathematical and algorithmic aspects of applied cryptology 4. Privacy enhancing cryptographic systems This included the traditional themes (the ?rst three) together with a special theme for 2009 workshop (fourth theme).

Progress in Cryptology - INDOCRYPT 2008 - 9th International Conference on Cryptology in India, Kharagpur, India, December... Progress in Cryptology - INDOCRYPT 2008 - 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings (Paperback, 2008 ed.)
Vincent Rijmen, Dipanwita Roy Chowdhury, Abhijit Das
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008.

The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.

Information Security - 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings (Paperback,... Information Security - 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008, Proceedings (Paperback, 2008 ed.)
Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days

The 11th Information Security Conference (ISC 2008) was held in Taipei, T- wan, September 15-18,2008. ISC is an annual international conference covering researchintheoryandapplicationsofinformationsecurity.Itwas?rstinitiatedas a workshop(ISW) in Japan in 1997.This was followed by ISW 1999 in Malaysia and ISW 2000 in Australia. ISW became ISC when it was held in Spain in 2001 (ISC2001).ThelatestconferenceswereheldinBrazil(ISC2002), UK(ISC2003), USA(ISC2004), Singapore(ISC2005), Greece(ISC2006), andChile(ISC2007). ThisyeartheeventwassponsoredbytheChineseCryptologyandInformation- curity Association (Taiwan), the Taiwan Information Security Center of the - searchCenterforITInnovation(AcademiaSinica, Taiwan), theNationalTaiwan UniversityofScience andTechnology(Taiwan), the NTUCenterfor Information and Electronics Technologies(Taiwan), Academia Sinica (Taiwan), the National ScienceCouncil(Taiwan), the MinistryofEducation(Taiwan), the TaipeiCh- terofthe IEEEComputerSociety (Taiwan), BankProE-serviceTechnologyCo., Ltd.(Taiwan), ExsiorData &InformationTechnology, Inc.(Taiwan), Giga-Byte EducationFoundation(Taiwan), Hewlett-PackardTaiwan, HivocalTechnologies, Co., Ltd.(Taiwan), MicrosoftTaiwan, PaysecureTechnologyCo., Ltd.(Taiwan), Symlink(Taiwan), and Yahoo TaiwanHoldingsLimited(TaiwanBranch). In order to cover the conference's broad scope, this year's main Program Committee consisted of 61 experts from 22 countries. Additionally, the c- ference also featured a special AES Subcommittee, chaired by Vincent Rijmen (Graz University of Technology, Austria). Theconferencereceived134submissions from31countries,33(including 4 in the AES special session) of which were selected by the committee members for presentation at the conference, based on quality, originality and relevance. Each paperwasanonymouslyreviewedbyatleastthreecommitteemembers.Inorderto encourageandpromotestudentparticipation, theISC2008ProgramCommittee selected three student-coauthored papers for the Best Student Paper award, one fromeachregion: Asia, Europe, andtheAmericas.Thepaperswere, respectively, "Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family," bySomitraSanadhyaandPalashSarkar(IndianStatisticalInstitute, India),"C- lisions for RC4-Hash," by Sebastiaan Indesteege and Bart Preneel (Katholieke UniversiteitLeuven, Belgium), and"ProxyRe-signaturesintheStandardModel," byShermanS.M. Chow(New YorkUniversity, USA) andRaphaelPhan(Lou- borough University, UK). The program also included invited speeches by Doug Tygar(UC Berkeley, USA) andTatsuakiOkamoto(NTT, Japan). Many people helped to make ISC 2008 successful. We would like to thank all thosewhocontributedtothetechnicalprogramandtoorganizingtheconference.

Advanced Encryption Standard - AES - 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected... Advanced Encryption Standard - AES - 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers (Paperback, 2005 ed.)
Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa
R1,598 Discovery Miles 15 980 Ships in 10 - 15 working days

This volume comprises the proceedings of the 4th Conference on Advanced - cryption Standard, 'AES - State of the Crypto Analysis, ' which was held in Bonn, Germany, during 10-12 May 2004. The conference followed a series of events organized by the US National - stitute of Standards and Technology (NIST) in order to hold an international competition to decide on an algorithm to serve as the Advanced Encryption Standard (AES). In 1998, at the ?rst AES conference (AES 1), 15 di?erent al- rithmswerepresented, discussed, reviewedandveri?ed.Asecondconferencewas organizedinApril1999, andbyAugust1999only?vecandidateswerestillinthe running: MARS, RC6, Rijndael, Serpent and Two?sh. After a further conference devoted to veri?cation, testing and examination of the candidate algorithms in order to prove their performance and security, one winning algorithm remained. The encryption scheme Rijndael, designed by the Belgian cryptographers Joan Daemen and Vincent Rijmen, was selected in 2000 to become the successor to the famous DES (Data Encryption Standard) and it is now the Advanced - cryption Standard.

Fast Software Encryption - 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers... Fast Software Encryption - 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised Papers (Paperback, 2002 ed.)
Joan Daemen, Vincent Rijmen
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Fast Software Encryption, FSE 2002, held in Leuven, Belgium in February 2002.The 21 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are organized in topical sections on blook cipher cryptoanalysis, integral cryptoanalysis, block cipher theory, stream cipher design, stream cipher cryptanalysis, and odds and ends.

The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.): Joan Daemen, Vincent Rijmen The Design of Rijndael - AES - The Advanced Encryption Standard (Hardcover, 2002 ed.)
Joan Daemen, Vincent Rijmen 1
R2,726 Discovery Miles 27 260 Ships in 10 - 15 working days

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented. This book is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.

State of the Art in Applied Cryptography - Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6,... State of the Art in Applied Cryptography - Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 3-6, 1997 Revised Lectures (Paperback, 1998 ed.)
Bart Preneel, Vincent Rijmen
R1,730 Discovery Miles 17 300 Ships in 10 - 15 working days

The Department of Electrical Engineering-ESAT at the Katholieke Universiteit Leuven regularly runs a course on the state of the art and evolution of computer security and industrial cryptography. The rst course took place in 1983, the second in 1989, and since then the course has been a biennial event. The course is intended for both researchers and practitioners from industry and government. It covers the basic principles as well as the most recent - velopments. Our own interests mean that the course emphasizes cryptography, but we also ensure that the most important topics in computer security are covered. We try to strike a good balance between basic theory and real-life - plications, between mathematical background and judicial aspects, and between recent technical developments and standardization issues. Perhaps the greatest strength of the course is the creation of an environment that enables dialogue between people from diverse professions and backgrounds. In 1993, we published the formal proceedings of the course in the Lecture Notes in Computer Science series (Volume 741). Since the el d of cryptography has advanced considerably during the interim period, there is a clear need to publish a new edition. Since 1993, several excellent textbooks and handbooks on cryptology have been published and the need for introductory-level papers has decreased. The growth of the main conferences in cryptology (Eurocrypt, Crypto, and Asiacrypt) shows that interest in the eld is increasing

Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II (Paperback, 1st ed. 2018)
Jesper Buus Nielsen, Vincent Rijmen
R3,966 Discovery Miles 39 660 Ships in 10 - 15 working days

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography.

Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I (Paperback, 1st ed. 2018)
Jesper Buus Nielsen, Vincent Rijmen
R1,671 Discovery Miles 16 710 Ships in 10 - 15 working days

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cryptography.

Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III (Paperback, 1st ed. 2018)
Jesper Buus Nielsen, Vincent Rijmen
R4,625 Discovery Miles 46 250 Ships in 10 - 15 working days

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018. The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography.

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I (Paperback, 1st ed. 2019)
Yuval Ishai, Vincent Rijmen
R3,621 Discovery Miles 36 210 Ships in 10 - 15 working days

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part III (Paperback, 1st ed. 2019)
Yuval Ishai, Vincent Rijmen
R3,122 Discovery Miles 31 220 Ships in 10 - 15 working days

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic... Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Yuval Ishai, Vincent Rijmen
R1,716 Discovery Miles 17 160 Ships in 10 - 15 working days

The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019. The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical sections: ABE and CCA security; succinct arguments and secure messaging; obfuscation; block ciphers; differential privacy; bounds for symmetric cryptography; non-malleability; blockchain and consensus; homomorphic primitives; standards; searchable encryption and ORAM; proofs of work and space; secure computation; quantum, secure computation and NIZK, lattice-based cryptography; foundations; efficient secure computation; signatures; information-theoretic cryptography; and cryptanalysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Art & Craft Rainbow Glitter Glue…
R46 R37 Discovery Miles 370
Sony PlayStation 5 Pulse 3D Wireless…
R1,999 R1,899 Discovery Miles 18 990
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Shield Brake and Parts Cleaner (500ml)
R61 Discovery Miles 610
Pamper Fine Cuts in Jelly - Chicken and…
R12 R11 Discovery Miles 110
Cadac Roll About 3 Panel Gas Heater
 (4)
R1,599 R1,314 Discovery Miles 13 140
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Butterfly A4 80gsm Paper Pads - Bright…
R36 Discovery Miles 360
Mellerware Plastic Oscilating Floor Fan…
 (2)
R552 Discovery Miles 5 520
Winfun Walker Ride On Train
R1,299 R999 Discovery Miles 9 990

 

Partners