Chapter 1. History of Cryptography to the 1800s.- Chapter 2. History of Cryptography from the 1800's.- Chapter 3. Basic Information Theory.- Chapter 4. Essential Number Theory and Discrete Math.- Chapter 5. Essential Algebra.- Chapter 6. Fiestel Networks.- Chapter 7. Substitution-Permutation Networks.- Chapter 8. S-Box Design.- Chapter 9. Cryptographic Hashes.- Chapter 10. Asymmetric Algorithms.- Chapter 11. Elliptic Curve Cryptography.- Chapter 12. Random Number Generators.- Chapter 13.SSL/TLS.- Chapter 14. Virtual Private networks, Authentication, And Wireless Security.- Chapter 15. Military Applications.- Chapter 16. Steganography.- Chapter 17. Cryptanalysis.- Chapter 18. Cryptographic Backdoors.- Chapter 19. Quantum Computing and Cryptography.
Автор: Qingtang Su Название: Color Image Watermarking: Algorithms and Technologies ISBN: 3110487578 ISBN-13(EAN): 9783110487572 Издательство: Walter de Gruyter Рейтинг: Цена: 18586.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents watermarking algorithms derived from signal processing methods such as wavelet transform, matrix decomposition and cosine transform to address the limitations of current technologies. For each algorithm, mathematical foundations are explained with analysis conducted to evaluate performances on robotness and efficiency. Combining theories and practice, it is suitable for information security researchers and industrial engineers.
Автор: Mazurczyk Wojciech Название: Information Hiding in Communication Networks ISBN: 1118861698 ISBN-13(EAN): 9781118861691 Издательство: Wiley Рейтинг: Цена: 13773.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications.
Автор: Aggelos Kiayias; Serdar Pehlivanoglu Название: Encryption for Digital Content ISBN: 1461427215 ISBN-13(EAN): 9781461427216 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This is a mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. It includes a complete description of broadcast encryption with various revocation and tracing functionalities.
Автор: Seokhie Hong; Tetsu Iwata Название: Fast Software Encryption ISBN: 3642138578 ISBN-13(EAN): 9783642138577 Издательство: Springer Рейтинг: Цена: 10480.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.
Автор: Orr Dunkelman Название: Fast Software Encryption ISBN: 3642033164 ISBN-13(EAN): 9783642033162 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: 16th International Workshop FSE 2009 Leuven Belgium February 2225 2009 Revised Selected Papers. .
Автор: Furht, Borko , Kirovski, Darko Название: Multimedia Encryption and Authentication Techniques and Applications ISBN: 0367453630 ISBN-13(EAN): 9780367453633 Издательство: Taylor&Francis Рейтинг: Цена: 9033.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Providing a comprehensive reference on advanced topics in the field, this book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprin
Автор: Ahmad Khairol Amali Bin, Ahmad Khaleel, Dulhare Uma N. Название: Functional Encryption ISBN: 3030608891 ISBN-13(EAN): 9783030608897 Издательство: Springer Цена: 13974.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Introduction.- Foundations of Functional Encryption.- Mathematical Concepts and Properties.- Elliptic Curve Cryptography.- XTR Algorithm: Efficient and Compact Subgroup Trace Representation.- HECC: Hyperelliptic Curve Cryptography.- Pairing-Based Cryptography.- NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units.- Cocks IBE Scheme.- Boneh-Franklin IBE.- Boneh-Boyen IBE.- Sakai-Kasahara IBE.- Hierarchical IBE.- Extensions of IBE and Related Primitives.- Attribute Based Encryption.- Digital Signatures.- Applications of Functional Encryption.- IRON: Functional Encryption Using Intel SGX .- Conclusion.
Автор: Kaisa Nyberg Название: Fast Software Encryption ISBN: 3540710388 ISBN-13(EAN): 9783540710387 Издательство: Springer Рейтинг: Цена: 12577.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, held in Lausanne, Switzerland in February 2008. This work includes papers that address various aspects of fast and secure primitives for symmetric cryptology and are organized in topical sections on SHA collisions, security bounds, and entropy.
Автор: Gregor Leander Название: Fast Software Encryption ISBN: 3662481154 ISBN-13(EAN): 9783662481158 Издательство: Springer Рейтинг: Цена: 11180.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The papers are organized in topical sections on block cipher cryptanalysis; more block cipher cryptanalysis; cryptanalysis of authenticated encryption schemes;
Автор: Laila El Aimani Название: Verifiable Composition of Signature and Encryption ISBN: 3319681117 ISBN-13(EAN): 9783319681115 Издательство: Springer Рейтинг: Цена: 15372.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.
Описание: Part I: Background.- 1. Preliminaries.- 2. Case-study primitives.- Part II: the "Sign then Encrypt" (StE) paradigm.- 3. Analysis of StE.- 4. An efficient variant of StE.- Part III: The "Commit then Encrypt and Sign" (CtEaS) paradigm.- 5. Analysis of CtEaS.- 6. CtEtS: an efficient variant of CtEaS.- Part IV: New paradigms.- 7. EtStE: a new paradigm for verifiable signcryption.- 8. Multi-user security.- 9. Insider privacy.-10. Wrap - up.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru