Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Partially Homomorphic Encryption, Koз Зetin Kaya, Цzdemir Funda, Цdemiş Цzger Zeynep


Варианты приобретения
Цена: 18167.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Koз Зetin Kaya, Цzdemir Funda, Цdemiş Цzger Zeynep
Название:  Partially Homomorphic Encryption
ISBN: 9783030876289
Издательство: Springer
Классификация:



ISBN-10: 3030876284
Обложка/Формат: Hardcover
Страницы: 158
Вес: 0.40 кг.
Дата издания: 31.10.2021
Язык: English
Размер: 23.39 x 15.60 x 1.12 cm
Ссылка на Издательство: Link
Поставляется из: Германии
Описание: Introduction.- Mathematical Background.- Rivest-Shamir-Adleman Algorithm.- Goldwasser-Micali Algorithm.- ElGamal Algorithm.- Benaloh Algorithm.- Naccache-Stern Algorithm.- Okamoto-Uchiyama Algorithm.- Paillier Algorithm.- Damgеrd-Jurik Algorithm.- Boneh-Goh-Nissim Algorithm.- Sander-Young-Yung Algorithm.- Bibliography.- Index.


The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption

Автор: Holden Joshua
Название: The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption
ISBN: 0691183317 ISBN-13(EAN): 9780691183312
Издательство: Wiley
Рейтинг:
Цена: 2533.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known.

Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book.

With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.

Cryptography in the information society

Автор: Ryabko, Boris Fionov, Andrey
Название: Cryptography in the information society
ISBN: 9811226156 ISBN-13(EAN): 9789811226151
Издательство: Marston Book Services
Рейтинг:
Цена: 15840.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

Fully Homomorphic Encryption in Real World Applications

Автор: Ayantika Chatterjee; Khin Mi Mi Aung
Название: Fully Homomorphic Encryption in Real World Applications
ISBN: 9811363927 ISBN-13(EAN): 9789811363924
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the ‘cloud’. The book begins by addressing perennial problems like sorting and searching through FHE data, followed by a detailed discussion of the basic components of any algorithm and adapting them to handle FHE data. In turn, the book focuses on algorithms in both non-recursive and recursive versions and discusses their realizations and challenges while operating in the FHE domain on existing unencrypted processors. It highlights potential complications and proposes solutions for encrypted database design with complex queries, including the basic design details of an encrypted processor architecture to support FHE operations in real-world applications.

Homomorphic Encryption and Applications

Автор: Xun Yi; Russell Paulet; Elisa Bertino
Название: Homomorphic Encryption and Applications
ISBN: 3319122282 ISBN-13(EAN): 9783319122281
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. This volume achieves a balance between the theoretical and the practical components of modern information security.

Fully Homomorphic Encryption in Real World Applications

Автор: Chatterjee Ayantika, Aung Khin Mi Mi
Название: Fully Homomorphic Encryption in Real World Applications
ISBN: 9811363951 ISBN-13(EAN): 9789811363955
Издательство: Springer
Рейтинг:
Цена: 13974.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book explores the latest developments in fully homomorphic encryption (FHE), an effective means of performing arbitrary operations on encrypted data before storing it in the `cloud`.

Homomorphic Signature Schemes

Автор: Giulia Traverso; Denise Demirel; Johannes Buchmann
Название: Homomorphic Signature Schemes
ISBN: 3319321145 ISBN-13(EAN): 9783319321141
Издательство: Springer
Рейтинг:
Цена: 6986.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework.

Limitations and Future Applications of Quantum Cryptography

Автор: Alka Agrawal, Brijesh K. Chaurasia, Neeraj Kumar, Raees Ahmad Khan
Название: Limitations and Future Applications of Quantum Cryptography
ISBN: 1799866785 ISBN-13(EAN): 9781799866787
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 27166.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography.

Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.

Fault-Tolerant Distributed Transactions on Blockchain

Автор: Jelle Hellings, Mohammad Sadoghi, Suyash Gupta
Название: Fault-Tolerant Distributed Transactions on Blockchain
ISBN: 1636390617 ISBN-13(EAN): 9781636390611
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 15939.00 р.
Наличие на складе: Нет в наличии.

Описание:

Since the introduction of Bitcoin—the first widespread application driven by blockchain—the interest of the public and private sectors in blockchain has skyrocketed. In recent years, blockchain-based fabrics have been used to address challenges in diverse fields such as trade, food production, property rights, identity-management, aid delivery, health care, and fraud prevention. This widespread interest follows from fundamental concepts on which blockchains are built that together embed the notion of trust, upon which blockchains are built.

1. Blockchains provide data transparancy. Data in a blockchain is stored in the form of a ledger, which contains an ordered history of all the transactions. This facilitates oversight and auditing.

2. Blockchains ensure data integrity by using strong cryptographic primitives. This guarantees that transactions accepted by the blockchain are authenticated by its issuer, are immutable, and cannot be repudiated by the issuer. This ensures accountability.

3. Blockchains are decentralized, democratic, and resilient. They use consensus-based replication to decentralize the ledger among many independent participants. Thus, it can operate completely decentralized and does not require trust in a single authority. Additions to the chain are performed by consensus, in which all participants have a democratic voice in maintaining the integrity of the blockchain. Due to the usage of replication and consensus, blockchains are also highly resilient to malicious attacks even when a significant portion of the participants are malicious. It further increases the opportunity for fairness and equity through democratization.

These fundamental concepts and the technologies behind them—a generic ledger-based data model, cryptographically ensured data integrity, and consensus-based replication—prove to be a powerful and inspiring combination, a catalyst to promote computational trust. In this book, we present an in-depth study of blockchain, unraveling its revolutionary promise to instill computational trust in society, all carefully tailored to a broad audience including students, researchers, and practitioners. We offer a comprehensive overview of theoretical limitations and practical usability of consensus protocols while examining the diverse landscape of how blockchains are manifested in their permissioned and permissionless forms.

Encryption

Автор: McLeish Richard J.
Название: Encryption
ISBN: 0993992218 ISBN-13(EAN): 9780993992216
Издательство: Неизвестно
Цена: 2240.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Security and Privacy in the Digital Era

Автор: Guerrier
Название: Security and Privacy in the Digital Era
ISBN: 1786300788 ISBN-13(EAN): 9781786300782
Издательство: Wiley
Рейтинг:
Цена: 22010.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: "The state, that must eradicate all feelings of insecurity, even potential ones, has been caught in a spiral of exception, suspicion and oppression that may lead to a complete disappearance of liberties.

Multimedia Encryption and Watermarking

Автор: Borko Furht; Edin Muharemagic; Daniel Socek
Название: Multimedia Encryption and Watermarking
ISBN: 1441937439 ISBN-13(EAN): 9781441937438
Издательство: Springer
Рейтинг:
Цена: 23058.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: to Multimedia Security.- Digital Rights Management for Multimedia.- Multimedia Cryptography.- to Multimedia Encryption.- An Overview of Modern Cryptography.- Important Modern Cryptosystems.- Image Encryption Algorithms.- Video Encryption Algorithms.- Speech and Audio Encryption.- Visual and Audio Secret Sharing.- Multimedia Watermarking.- to Watermarking.- Applications of Digital Watermarking.- Digital Watermarking Concepts.- Digital Watermarking and Binary Images.- Two-Level Marks: Design.- Two-Level Marks: Implementations.- Future of Watermarking.

Applied Approach to Privacy and Security for the Internet of Things

Автор: Parag Chatterjee, Emmanuel Benoist, Asoke Nath
Название: Applied Approach to Privacy and Security for the Internet of Things
ISBN: 1799824446 ISBN-13(EAN): 9781799824442
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 31601.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities.

Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия