Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Security of Block Ciphers, Sakiyama Kazuo


Варианты приобретения
Цена: 14882.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Sakiyama Kazuo
Название:  Security of Block Ciphers
ISBN: 9781118660010
Издательство: Wiley
Классификация:
ISBN-10: 1118660013
Обложка/Формат: Hardback
Страницы: 312
Вес: 0.63 кг.
Дата издания: 04.09.2015
Серия: Wiley - ieee
Язык: English
Иллюстрации: Illustrations
Размер: 249 x 169 x 20
Читательская аудитория: Professional & vocational
Ключевые слова: Electronics & communications engineering,Computer networking & communications
Подзаголовок: From algorithm design to hardware implementation
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание: A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis
  • Written by authors known within the academic cryptography community, this book presents the latest developments in current research
  • Unique in its combination of both algorithmic-level design and hardware-level implementation; this all-round approach - algorithm to implementation - covers security from start to completion
  • Deals with AES (Advanced Encryption standard), one of the most used symmetric-key ciphers, which helps the reader to learn the fundamental theory of cryptanalysis and practical applications of side-channel analysis



The Art of Deception: Controlling the Human Element of Security

Автор: Kevin D. Mitnick
Название: The Art of Deception: Controlling the Human Element of Security
ISBN: 076454280X ISBN-13(EAN): 9780764542800
Издательство: Wiley
Рейтинг:
Цена: 1584.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system.

Securing  Intellectual Property,

Автор: Information Security
Название: Securing Intellectual Property,
ISBN: 0750679956 ISBN-13(EAN): 9780750679954
Издательство: Elsevier Science
Рейтинг:
Цена: 8420.00 р.
Наличие на складе: Поставка под заказ.

Описание: Most employers are astounded at how easily and quickly their proprietary information can get out of their control. This book offers solutions to common intellectual property problems facing security managers, computer security professionals, corporate legal counsel, and human resource managers.

Rc4 Stream Cipher And Its Variants

Автор: Paul
Название: Rc4 Stream Cipher And Its Variants
ISBN: 1439831351 ISBN-13(EAN): 9781439831359
Издательство: Taylor&Francis
Рейтинг:
Цена: 27562.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.





After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4.





With open research problems in each chapter, this book offers a complete account of the most current research on RC4.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия