0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993): Eli... Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993)
Eli Biham, Adi Shamir
R3,002 Discovery Miles 30 020 Ships in 10 - 15 working days

DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the fields leading researchers, and describes state-of-the-art research in a clear and completely contained manner.

Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected... Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Eli Biham, Amr M. Youssef
R1,630 Discovery Miles 16 300 Ships in 10 - 15 working days

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Advances in Cryptology - EUROCRYPT 2003 - International Conference on the Theory and Applications of Cryptographic Techniques,... Advances in Cryptology - EUROCRYPT 2003 - International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings (Paperback, 2003 ed.)
Eli Biham
R3,098 Discovery Miles 30 980 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, held in Warsaw, Poland in May 2003. The 37 revised full papers presented together with two invited papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on cryptanalysis, secure multi-party communication, zero-knowledge protocols, foundations and complexity-theoretic security, public key encryption, new primitives, elliptic curve cryptography, digital signatures, information-theoretic cryptography, and group signatures.

Fast Software Encryption - 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings (Paperback,... Fast Software Encryption - 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings (Paperback, 1997 ed.)
Eli Biham
R1,566 Discovery Miles 15 660 Ships in 10 - 15 working days

This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bostik Glue Stick (40g)
R52 Discovery Miles 520
The Papery A5 MOM 2025 Diary - Lady Bugs
R349 R300 Discovery Miles 3 000
Christian Dior Dior Homme Sport Eau De…
R3,065 Discovery Miles 30 650
Atmosvuur
Jan Braai Hardcover R590 R425 Discovery Miles 4 250
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Britney Spears Fantasy Eau De Parfum…
R1,037 R507 Discovery Miles 5 070
ZA Cute Puppy Love Paw Set (Necklace…
R712 R499 Discovery Miles 4 990
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180
Efekto Eco Rat - Rodenticide (7 x 20g…
R139 R110 Discovery Miles 1 100
Loot
Nadine Gordimer Paperback  (2)
R383 R318 Discovery Miles 3 180

 

Partners