Theory of Cryptography, Dennis Hofheinz; Alon Rosen
Автор: Oun Hwang, Seong Название: Modern Cryptography with Proof Techniques and Applications ISBN: 1138584088 ISBN-13(EAN): 9781138584082 Издательство: Taylor&Francis Рейтинг: Цена: 16843.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Proof techniques in cryptography are very difficult to understand even for students or researchers who major in cryptography. In addition, in contrast to the excessive emphases on the security proof of the cryptographic schemes, practical aspects of them have received comparatively less attention.
Автор: Shlomi Dolev; Danny Hendler; Sachin Lodha; Moti Yu Название: Cyber Security Cryptography and Machine Learning ISBN: 3030209504 ISBN-13(EAN): 9783030209506 Издательство: Springer Рейтинг: Цена: 9222.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Автор: Kenneth G. Paterson; Douglas Stebila Название: Selected Areas in Cryptography – SAC 2019 ISBN: 3030384705 ISBN-13(EAN): 9783030384708 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019.
Автор: Stephen Haunts Название: Applied Cryptography in .NET and Azure Key Vault ISBN: 1484243749 ISBN-13(EAN): 9781484243749 Издательство: Springer Рейтинг: Цена: 4890.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution.
Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you’ll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications.
Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects.
What You'll Learn
Get an introduction to the principles of encryptionUnderstand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signaturesCombine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiationUse Microsoft's Azure Key Vault to securely store encryption keys and secretsBuild real-world code to use in your own projects
Who This Book Is For
Software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed.
Автор: Martin Albrecht Название: Cryptography and Coding ISBN: 303035198X ISBN-13(EAN): 9783030351984 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.
Автор: Bray Shannon Название: Implementing Cryptography Using Python ISBN: 1119612209 ISBN-13(EAN): 9781119612209 Издательство: Wiley Рейтинг: Цена: 6018.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This textbook provides an accessible and comprehensive introduction to the field of lesbian, gay, bisexual, transgender, intersex and queer psychology. Designed for undergraduate students taking LGBTIQ psychology, psychology of sexuality or related courses, it includes pedagogical features to support learning and to facilitate discussion and reflection.
Автор: Marco Baldi; Edoardo Persichetti; Paolo Santini Название: Code-Based Cryptography ISBN: 3030259218 ISBN-13(EAN): 9783030259211 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed and revised post-conference proceedings of the 7th International Workshop on Code-Based Cryptography, CBC 2019, held in Darmstadt, Germany, in May 2019. The eight papers presented in this book were carefully reviewed and selected from numerous submissions.
Автор: Bertram Linda a., Dooble Gunther Van Название: Transformation of Cryptography ISBN: 3749450749 ISBN-13(EAN): 9783749450749 Издательство: Неизвестно Рейтинг: Цена: 1810.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The authors analyze over two dozen fundamental concepts of encryption, milestones, mega-trends and sustainable change in regard to Secret Communications. Beginnings and terminations within process and product life cycles lead in sum to a "Transformation of Cryptography", which requires an interdisciplinary approach: Innovative breakthroughs in Cryptography are discussed within this essay as a third Epoch of Cryptography like the solving of the key transport problem with the Cesura in Cryptography by Secret Strems and also with Juggerknot Keys. Multi-Encryption and the Exponential Encryption requires New Thinking for Cryptoanalysis - in alliance with the described concepts of e.g. Cryptographic Calling, Cryptographic Discovery and Fiasco Forwarding with Fiasco Keys. Mathematicians have with the calculation of the truth the human right of privacy in their hands - on the other side elaborated competencies and skills in the internet age are required e.g. to program applications and also to update first the terms and nomenclatura of today interfering interdisciplinary scientific views. As an educational outlook the further Democratization of Encryption is based on discussing the Transformations of Cryptography in teaching lessons and on the development of open source programming's, which provide not only insight in their codes, processes and algorithms, but also provide e.g. with Virtual Keyboards within the same computational process a Trusted Execution Environment (TEE) and a technical- and network-oriented solution for "Going the Extra-Mile": What that is? is described in detail at the end of this edition.
Автор: Dongdai Lin; Kazue Sako Название: Public-Key Cryptography – PKC 2019 ISBN: 303017252X ISBN-13(EAN): 9783030172527 Издательство: Springer Рейтинг: Цена: 11459.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions.
Автор: Roberto Avanzi; Howard Heys Название: Selected Areas in Cryptography – SAC 2016 ISBN: 3319694529 ISBN-13(EAN): 9783319694528 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John`s, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions.
Автор: Martin, Keith Название: Everyday cryptography ISBN: 0198788010 ISBN-13(EAN): 9780198788010 Издательство: Oxford Academ Рейтинг: Цена: 8712.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for various technologies.
Описание: This "Encyclopedia of modern Cryptography and Internet Security" brings the latest and most relevant coverage of the topic - expanding a lot of relevant terms and central key words: It's a Nomenclatura # Fundamental information on modern Cryptography and Internet Security in a broadband overview. # Extensive resource with most relevant explanations of keywords and terms. # Introduction article by editing authors on "Transformation of Cryptography". # Effective handbook for students, tutors and researching professionals in many fields and lecturing and developing experts of all levels to deepen the existing knowledge of the "nomenclatura" of these topics from Information Theory, Applied Mathematics, Technological Impact Assessment, for sure Linguistic, and Computational Methods of Engineering, Programming etc.. # Including the didactic game for teaching: "Cryptographic Cafeteria". # With bibliographic references to start further readings. # Appearing in an A-Z format, Nomenclatura - The Encyclopedia of modern Cryptography and Internet Security provides easy, intuitive access to scientific information on all relevant aspects of Cryptography, Encryption and Information and Internet Security. This modern Encyclopedia is broad in scope, covering everything from AutoCrypt and Exponential Encryption to Zero-Knowledge-Proof Keys including explanations on Authentication, Block Ciphers and Stream Ciphers, Cryptanalysis and Security, Cryptographic Calling and Cryptographic Discovery, Cryptographic Protocols like e.g. the Echo-Protocol, Elliptic Curve Cryptography, Fiasco Forwarding, Goldbugs, Hash Functions and MACs, Juggling Juggernauts and Juggerknot Keys, McEliece, Multi-Encryption, NTRU, OTM, Public Key Cryptography, Patch-Points, POPTASTIC, Quantum Computing Cryptography, Secret Streams, Turtle Hopping, Two-Way-Calling and many more... This introducing and cross-linking reference has been published in two popular formats: print and as eBook. The printed book edition
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru