0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993): Eli... Differential Cryptanalysis of the Data Encryption Standard (Paperback, Softcover reprint of the original 1st ed. 1993)
Eli Biham, Adi Shamir
R3,251 Discovery Miles 32 510 Ships in 10 - 15 working days

DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the fields leading researchers, and describes state-of-the-art research in a clear and completely contained manner.

Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected... Selected Areas in Cryptography - 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers (Paperback, 2007 ed.)
Eli Biham, Amr M. Youssef
R1,766 Discovery Miles 17 660 Ships in 10 - 15 working days

This volume constitutes the refereed post-proceedings of the 13th International Workshop on Selected Areas in Cryptography. Twenty-five full papers are presented along with two important invited talks. The papers are organized into topical sections covering block cipher cryptanalysis, stream cipher cryptanalysis, block and stream ciphers, side-channel attacks, efficient implementations, message authentication codes, and hash functions.

Advances in Cryptology - EUROCRYPT 2003 - International Conference on the Theory and Applications of Cryptographic Techniques,... Advances in Cryptology - EUROCRYPT 2003 - International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings (Paperback, 2003 ed.)
Eli Biham
R3,347 Discovery Miles 33 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, held in Warsaw, Poland in May 2003. The 37 revised full papers presented together with two invited papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on cryptanalysis, secure multi-party communication, zero-knowledge protocols, foundations and complexity-theoretic security, public key encryption, new primitives, elliptic curve cryptography, digital signatures, information-theoretic cryptography, and group signatures.

Fast Software Encryption - 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings (Paperback,... Fast Software Encryption - 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings (Paperback, 1997 ed.)
Eli Biham
R1,700 Discovery Miles 17 000 Ships in 10 - 15 working days

This volume constitutes the strictly refereed post-workshop proceedings of the Fourth International Workshop on Fast Software Encryption, FSE'97, held in Haifa, Israel, in January 1997.
The 23 full papers presented were carefully selected from 44 submissions and revised for inclusion in the book. Also contained is a summary of a panel discussion. The papers are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption. Particular emphasis is placed on applicability and implementation issues of fast cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Contemporary Plays by African Women…
Yvette Hutchison, Amy Jephta Paperback R894 Discovery Miles 8 940
Plays: The Silver Box Joy Strife…
John Galsworthy Paperback R503 Discovery Miles 5 030
The Seagull
Michael Frayn Hardcover R1,335 Discovery Miles 13 350
Beautiful Thing
Jonathan Harvey Hardcover R486 Discovery Miles 4 860
Scared to Death
Ron Aldridge Paperback R336 Discovery Miles 3 360
The FULSTOW BOYS
Gordon Steel Paperback R336 Discovery Miles 3 360
One Night in November
Alan Pollock Paperback R336 Discovery Miles 3 360
Is God Is
Aleshea Harris Paperback R485 R413 Discovery Miles 4 130
TWITSTORM
Chris England Paperback R336 Discovery Miles 3 360
Bad Jazz
Robort Farquhar Paperback R336 Discovery Miles 3 360

 

Partners