• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Chaos-Based Cryptography: Theory, Algorithms and Applications » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC

Chaos-Based Cryptography: Theory, Algorithms and Applications

ISBN-13: 9783642205415 / Angielski / Twarda / 2011 / 398 str.

Ljupco Kocarev; Shiguo Lian
Chaos-Based Cryptography: Theory, Algorithms and Applications Kocarev, Ljupco 9783642205415 Not Avail - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Chaos-Based Cryptography: Theory, Algorithms and Applications

ISBN-13: 9783642205415 / Angielski / Twarda / 2011 / 398 str.

Ljupco Kocarev; Shiguo Lian
cena 605,23
(netto: 576,41 VAT:  5%)

Najniższa cena z 30 dni: 578,30
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.

The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.

The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Artificial Intelligence - General
Computers > Security - Cryptography & Encryption
Computers > Information Theory
Wydawca:
Not Avail
Seria wydawnicza:
Studies in Computational Intelligence
Język:
Angielski
ISBN-13:
9783642205415
Rok wydania:
2011
Numer serii:
000318395
Ilość stron:
398
Waga:
0.72 kg
Wymiary:
23.37 x 15.49 x 2.54
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

1.

Introduction to Chaos.-

 

 

2.

Chaos-based Cryptography

 

3.

Digitized Chaos for Pseudo-Random Number Generation in Cryptography

 

.-

 

 

4.

Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography

 

.-

 

 

5.

Chaos based hash function

.-

 

 

6.

Chaos-Based Video Encryption Algorithms

 

.-

 

 

7.

Cryptanalysis of chaotic ciphers

 

.-

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

 

 

4.

Formation of High-Dimensional Chaotic Maps and Their Uses in Cryptography

 

.-

 

 

5.

Chaos based hash function

.-

 

 

6.

Chaos-Based Video Encryption Algorithms

 

.-

 

 

7.

Cryptanalysis of chaotic ciphers

 

.-

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

 

 

5.

Chaos based hash function

.-

 

 

6.

Chaos-Based Video Encryption Algorithms

 

.-

 

 

7.

Cryptanalysis of chaotic ciphers

 

.-

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

.-

 

 

6.

Chaos-Based Video Encryption Algorithms

 

.-

 

 

7.

Cryptanalysis of chaotic ciphers

 

.-

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

 

 

6.

Chaos-Based Video Encryption Algorithms

 

.-

 

 

7.

Cryptanalysis of chaotic ciphers

 

.-

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

 

 

7.

Cryptanalysis of chaotic ciphers

 

.-

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

8.

Lessons learnt from the cryptanalysis of chaos-based ciphers

 

.-

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

 

9.

Hardware Implementation of chaos based cipher: Design of embedded systems for security applications

 

.-

 

10.

Hardware implementation of chaos-secured optical communication systems

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

 

.-

 

 

11.

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms.

Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.

 

The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics.

 

The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.

 



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia