Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions, Mangey Ram, Rajeev Singh
Автор: Mohammad Tariq Banday Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522557423 ISBN-13(EAN): 9781522557425 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 28413.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The Internet of Things is a technological revolution that represents the future of computing and communications. Even though efforts have been made to standardize Internet of Things devices and how they communicate with the web, a uniform architecture is not followed. This inconsistency directly impacts and limits security standards that need to be put in place to secure the data being exchanged across networks.Cryptographic Security Solutions for the Internet of Things is an essential reference source that discusses novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. With discussions on cryptographic algorithms, encryption techniques, and authentication procedures, this book is ideally designed for managers, IT consultants, startup companies, ICT procurement managers, systems and network integrators, infrastructure service providers, students, researchers, and academic professionals.
Автор: Kannan Balasubramanian, K. Mala, M. Rajakan Название: Cryptographic Solutions for Secure Online Banking and Commerce ISBN: 1522502734 ISBN-13(EAN): 9781522502739 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 29106.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: "This book discusses the challenges of providing security for online applications and transactions, highlighting research on digital signatures, public key infrastructure, encryption algorithms, and digital certificates, as well as other e-commerce protocols"--
Автор: Banday Mohammad Tariq Название: Cryptographic Security Solutions for the Internet of Things ISBN: 1522586296 ISBN-13(EAN): 9781522586296 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 18810.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Discusses novel designs and developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data in the Internet of Things. Coverage includes cryptographic algorithms, encryption techniques, and authentication procedures.
Описание: Internet usage has become a facet of everyday life, especially as more technological advances have made it easier to connect to the web from virtually anywhere in the developed world. However, with this increased usage comes heightened threats to security within digital environments.The Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security identifies emergent research and techniques being utilized in the field of cryptology and cyber threat prevention. Featuring theoretical perspectives, best practices, and future research directions, this handbook of research is a vital resource for professionals, researchers, faculty members, scientists, graduate students, scholars, and software developers interested in threat identification and prevention.
Автор: Krzewinski Basil Название: Cryptographic Attacks: Computer Security Exploits ISBN: 153002529X ISBN-13(EAN): 9781530025299 Издательство: Неизвестно Цена: 10346.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Lilya Budaghyan Название: Construction and Analysis of Cryptographic Functions ISBN: 3319363581 ISBN-13(EAN): 9783319363585 Издательство: Springer Рейтинг: Цена: 9781.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.
Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
Автор: Gierlichs Название: Cryptographic Hardware and Embedded Systems – CHES 2016 ISBN: 3662531399 ISBN-13(EAN): 9783662531396 Издательство: Springer Рейтинг: Цена: 11460.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.
Автор: Wieland Fischer; Naofumi Homma Название: Cryptographic Hardware and Embedded Systems – CHES 2017 ISBN: 3319667866 ISBN-13(EAN): 9783319667867 Издательство: Springer Рейтинг: Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations.
Автор: Lejla Batina; Matthew Robshaw Название: Cryptographic Hardware and Embedded Systems -- CHES 2014 ISBN: 3662447088 ISBN-13(EAN): 9783662447086 Издательство: Springer Рейтинг: Цена: 11180.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Side-Channel Attacks.- EM Attack Is Non-invasive? - Design Methodology and Validity Verification of EM Attack Sensor.- A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.- How to Estimate the Success Rate of Higher-Order Side-Channel Attacks.- Good Is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory.- New Attacks and Constructions.- "Ooh Aah... Just a Little Bit" A Small Amount of Side Channel Can Go a Long Way.- Destroying Fault Invariant with Randomization: A Countermeasure for AES against Differential Fault Attacks.- Reversing Stealthy Dopant-Level Circuits.- Constructing S-boxes for Lightweight Cryptography with Feistel Structure.- Countermeasures.- A Statistical Model for Higher Order DPA on Masked Devices.- Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-Channel Countermeasures.- Secure Conversion between Boolean and Arithmetic Masking of Any Order.- Making RSA-PSS Provably Secure against Non-random Faults.- Algorithm Specific SCA.- Side-Channel Attack against RSA Key Generation Algorithms.- Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.- RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data.- Simple Power Analysis on AES Key Expansion Revisited.- ECC Implementations.- Efficient Pairings and ECC for Embedded Systems.- Curve41417: Karatsuba Revisited.- Implementations.- Cofactorization on Graphics Processing Units.- Enhanced Lattice-Based Signatures on Reconfigurable Hardware.- Compact Ring-LWE Cryptoprocessor.- Hardware Implementations of Symmetric Cryptosystems.- ICEPOLE: High-Speed, Hardware-Oriented Authenticated Encryption.- FPGA Implementations of SPRING: And Their Countermeasures against Side-Channel Attacks.- FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison.- PUFs Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?.- Efficient Power and Timing Side Channels for Physical Unclonable Functions.- Physical Characterization of Arbiter PUFs.- Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM.- RNGs and SCA Issues in Hardware.- Embedded Evaluation of Randomness in Oscillator Based Elementary TRNG.- Entropy Evaluation for Oscillator-Based True Random Number Generators.- Side-Channel Leakage through Static Power: Should We Care about in Practice.- Gate-Level Masking under a Path-Based Leakage Metric.- Early Propagation and Imbalanced Routing, How to Diminish in FPGAs.
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical modelling, and simulation. Neither optimization in engineering, nor the performance of safety-critical system and system security; nor high assurance software architecture and design would be possible without the development of mathematical applications.
De Gruyter Series on the Applications of Mathematics in Engineering and Information Sciences (AMEIS) focusses on the latest applications of engineering and information technology that are possible only with the use of mathematical methods. By identifying the gaps in knowledge of engineering applications the AMEIS series fosters the international interchange between the sciences and keeps the reader informed about the latest developments.
Автор: Miller A. Ray Название: The Cryptographic Mathematics of Enigma ISBN: 1478379278 ISBN-13(EAN): 9781478379270 Издательство: Неизвестно Цена: 2067.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru