RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.
After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute...
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive experti...
This second edition features coverage of L-functions and function fields to provide a more modern view of the field. It also introduces class groups for both binary and quadratic forms, making it much easier to prove the finiteness of the class number of both groups via an isomorphism.
This second edition features coverage of L-functions and function fields to provide a more modern view of the field. It also introduces class groups f...
Now in its second edition, this book provides the first comprehensive account of the four standard products of graphs. It systematically treats the Cartesian, strong, direct, and lexicographic product of graphs and graphs isometrically embeddable into them. The text collects a wealth of information previously widely scattered in the literature on products of graphs, in particular, information on hypercubes, median graphs, Hamming graphs, triangle-free graphs, and vertex-transitive graphs. It also covers colorings, automorphisms, homomorphisms, domination, the capacity of products of...
Now in its second edition, this book provides the first comprehensive account of the four standard products of graphs. It systematically treats the...
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises.
Focusing on the cryptosystems themselves rather than the means of breaking them, the...
Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Sou...
"Volume of geometric objects was studied by ancient Greek mathematicians. In discrete geometry, a relatively new branch of geometry, volume plays a significant role in generating topics for research. Part I consists of survey chapters of selected topics on volume and Part II consisting of chapters of selected proofs of theorems stated in Part I.""--
"Volume of geometric objects was studied by ancient Greek mathematicians. In discrete geometry, a relatively new branch of geometry, volume plays a si...