|
Showing 1 - 5 of
5 matches in All Departments
Cryptographic Boolean Functions and Applications, Second Edition is
designed to be a comprehensive reference for the use of Boolean
functions in modern cryptography. While the vast majority of
research on cryptographic Boolean functions has been achieved since
the 1970s, when cryptography began to be widely used in everyday
transactions, in particular banking, relevant material is scattered
over hundreds of journal articles, conference proceedings, books,
reports and notes, some of them only available online. This book
follows the previous edition in sifting through this compendium and
gathering the most significant information in one concise reference
book. The work therefore encompasses over 600 citations, covering
every aspect of the applications of cryptographic Boolean
functions. Since 2008, the subject has seen a very large number of
new results, and in response, the authors have prepared a new
chapter on special functions. The new edition brings 100 completely
new references and an expansion of 50 new pages, along with heavy
revision throughout the text.
This book consists of refereed selected papers from the
International Conference on Security & Privacy - ICSP 2020. The
book is focused on the state-of-the-art developments of network
security, secure cryptographic protocols, post-quantum
cryptography, quantum cryptography, block-chain and cryptocurrency,
IoT security and privacy, cloud security, machine learning in
cybersecurity, and other disciplines related to security and
privacy. In this book, a wide variety of basic security primitives
are discussed along with recent developments in some advanced
topics like functional encryption, two-party/multi-party
computation, bitcoin, cryptocurrency, and post-quantum security.
This book consists of refereed selected papers from the
International Conference on Security & Privacy - ICSP 2020. The
book is focused on the state-of-the-art developments of network
security, secure cryptographic protocols, post-quantum
cryptography, quantum cryptography, block-chain and cryptocurrency,
IoT security and privacy, cloud security, machine learning in
cybersecurity, and other disciplines related to security and
privacy. In this book, a wide variety of basic security primitives
are discussed along with recent developments in some advanced
topics like functional encryption, two-party/multi-party
computation, bitcoin, cryptocurrency, and post-quantum security.
Boolean functions are the building blocks of symmetric
cryptographic systems. Symmetrical cryptographic algorithms are
fundamental tools in the design of all types of digital security
systems (i.e. communications, financial and e-commerce).
Cryptographic Boolean Functions and Applications is a concise
reference that shows how Boolean functions are used in
cryptography. Currently, practitioners who need to apply Boolean
functions in the design of cryptographic algorithms and protocols
need to patch together needed information from a variety of
resources (books, journal articles and other sources). This book
compiles the key essential information in one easy to use,
step-by-step reference.
Beginning with the basics of the necessary theory the book goes on
to examine more technical topics, some of which are at the frontier
of current research.
-Serves as a complete resource for the successful design or
implementation of cryptographic algorithms or protocols using
Boolean functions
-Provides engineers and scientists with a needed reference for the
use of Boolean functions in cryptography
-Addresses the issues of cryptographic Boolean functions theory and
applications in one concentrated resource.
-Organized logically to help the reader easily understand the topic
|
Security and Privacy - Second International Conference, ICSP 2021, Jamshedpur, India, November 16-17, 2021, Proceedings (Paperback, 1st ed. 2021)
Pantelimon Stanica, Sihem Mesnager, Sumit Kumar Debnath
|
R1,898
Discovery Miles 18 980
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the Second
International Conference, ICSP 2021, held in Jamshedpur, India, in
November 2021. The 10 full papers were carefully reviewed and
selected from 44 submissions. The contributions are organized in
the following blocks: Cryptanalysis and other attacks; Symmetric
cryptography and hash functions; Mathematical foundations of
cryptography; Embedded systems security; Security in hardware;
Authentication, Key management, Public key (asymmetric) techniques,
and Information-theoretic techniques.
|
You may like...
Kill Joy
Holly Jackson
Paperback
R240
R192
Discovery Miles 1 920
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|