![]() |
Cryptology: Machines, History and Methods
ISBN: 9780890063996 / Angielski / Twarda / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yes...
|
cena:
899,12 zł |
![]() |
The LLL Algorithm: Survey and Applications
ISBN: 9783642261640 / Angielski / Miękka / 496 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Computational aspects of geometry of numbers have been revolutionized by the Lenstra Lenstra Lovasz lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediately recognized as one of the most important algorithmic achievements of the twentieth century, because of its broad applicability and apparent simplicity. Its popularity has kept growing since, as testi ed by the hundreds of citations of the original article, and the ever more frequent use of LLL as a...
Computational aspects of geometry of numbers have been revolutionized by the Lenstra Lenstra Lovasz lattice reduction algorithm (LLL), which has led t...
|
cena:
910,65 zł |
![]() |
Elliptic Curves and Their Applications to Cryptography: An Introduction
ISBN: 9781461373728 / Angielski / Miękka / 164 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such systems.
Elliptic Curves and Their Applications to Cryptography: An Introduction provides a comprehensive and self-contained introduction to elliptic curves and how they are employed to secure public key cryptosystems. Even though the... Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic...
|
cena:
910,65 zł |
![]() |
Public-Key Cryptography – PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I
ISBN: 9783031313677 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2023, which took place in March 2023 in Atlanta, GA, USA.The 49 papers included in these proceedings were carefully reviewed and selected from 183 submissions. They focus on all aspects of public-key cryptography, covering Post-Quantum Cryptography, Key Exchange and Messaging, Encryption, Homomorphic Cryptography and other topics.
The two-volume proceedings set LNCS 13940 and 13941 constitutes the refereed proceedings of the 26th IACR International Conference on Practice and The...
|
cena:
910,65 zł |
![]() |
Handbook of Biometrics
ISBN: 9780387710402 / Angielski / Twarda / 568 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of large-scale biometric systems in both commercial (e.g., grocery stores, amusement parks, airports) and government (e.g., US-VISIT) applications has served to increase the public's awareness of this technology. This rapid growth has also highlighted... Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry i... |
cena:
910,65 zł |
![]() |
Rc4 Stream Cipher and Its Variants
ISBN: 9781439831359 / Angielski / Twarda / 311 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128. After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute... RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive experti... |
cena:
912,11 zł |
![]() |
Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities
ISBN: 9781522575160 / Angielski / Twarda / 180 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
926,30 zł |
![]() |
Implementing Computational Intelligence Techniques for Security Systems Design
ISBN: 9781799824190 / Angielski / Miękka / 364 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better...
Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms tha...
|
cena:
926,30 zł |
![]() |
Multidisciplinary Approach to Modern Digital Steganography
ISBN: 9781799871613 / Angielski / Miękka / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
926,30 zł |
![]() |
The History of Information Security: A Comprehensive Handbook
ISBN: 9780444516084 / Angielski / Twarda / 887 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties. The history of Information Security reaches back to ancient times and starts with the emergence of bureaucracy in administration and warfare. Some aspects, such as the interception of encrypted messages during World War II, have attracted huge attention, whereas other...
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptogra...
|
cena:
932,38 zł |
![]() |
Automated Secure Computing for Next-Generation Sys tems
ISBN: 9781394213597 / Angielski / Inna Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
960,12 zł |
![]() |
Communication System Security
ISBN: 9781439840368 / Angielski / Twarda / 750 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design. Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. ...Helping current and future system designers take a more productive approach in the field, Communication System Security shows how ... |
cena:
962,79 zł |
![]() |
Optical Coding Theory with Prime
ISBN: 9781466567801 / Angielski / Twarda / 384 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no book has been specifically dedicated to optical coding theory until now. Written by renowned authorities in the field, Optical Coding Theory with Prime gathers together in one volume the fundamentals and developments of optical coding theory, with a focus on families of prime codes, supplemented with several families of non-prime codes. The book also explores potential applications to coding-based optical systems and... Although several books cover the coding theory of wireless communications and the hardware technologies and coding techniques of optical CDMA, no b... |
cena:
962,79 zł |
![]() |
Cybersecurity Fundamentals: A Real-World Perspective
ISBN: 9780367476489 / Angielski / Twarda / 304 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
962,79 zł |
![]() |
Progress in Data Encryption Research
ISBN: 9781629482583 / Angielski / Twarda / 158 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
988,07 zł |
![]() |
Distributed Networks: Intelligence, Security, and Applications
ISBN: 9781466559578 / Angielski / Twarda / 412 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and control in terms of scalability, flexibility, and robustness. It also introduces its own challenges. Distributed Networks: Intelligence, Security, and Applications brings together scientific research in distributed network intelligence, security, and novel applications. The book presents recent trends and advances in the theory and applications of network intelligence and helps you understand how to successfully... For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized c... |
cena:
988,12 zł |
![]() |
Handbook of Security and Privacy of Ai-Enabled Healthcare Systems and Internet of Medical Things
ISBN: 9781032438795 / Angielski Termin realizacji zamówienia: ok. 5-8 dni roboczych. |
cena:
988,12 zł |
![]() |
Cryptographic Engineering
ISBN: 9780387718163 / Angielski / Twarda / 522 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments.... Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and... |
cena:
989,85 zł |
![]() |
Algebraic Cryptanalysis
ISBN: 9780387887562 / Angielski / Twarda / 356 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial Systems of Equations, with a survey of the methods used in practice, including SAT-solvers and the methods of Nicolas Courtois. Topics include: Analytic Combinatorics, and its application to cryptanalysis The... Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided... |
cena:
989,85 zł |
![]() |
Cryptographic Engineering
ISBN: 9781441944177 / Angielski / Miękka / 522 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments.... Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and... |
cena:
989,85 zł |