Описание: This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. * Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; * Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); * Includes a full suite of classroom materials including exercises, Q&A, and examples.
Автор: Kui Ren, Cong Wang Название: Searchable Encryption: From Concepts to Systems ISBN: 3031213769 ISBN-13(EAN): 9783031213762 Издательство: Springer Рейтинг: Цена: 19564.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from searchable encryption constructions. The book fits in the timely context, where the necessity of safeguarding important and sensitive data has been globally recognized. Traditional security measures, such as storing data behind network firewalls and layers of access control mechanisms to keep attackers out, are no longer sufficient to cope with the expanding landscape of surging cyber threats. There is an urgent call to keep sensitive data always encrypted to protect the data at rest, in transit, and in use. Doing so guarantees data confidentiality for owners, even if the data is out of their hands, e.g., hosted at in-the-cloud databases. The daunting challenge is how to perform computation over encrypted data. As we unfold in this book, searchable encryption, as a specific line of research in this broadly defined area, has received tremendous advancements over the past decades. This book is majorly oriented toward senior undergraduates, graduate students, and researchers, who want to work in the field and need extensive coverage of encrypted database research. It also targets security practitioners who want to make well-informed deployment choices of the latest advancements in searchable encryption for their targeted applications. Hopefully, this book will be beneficial in both regards.
Автор: Gupta, Brij B. (national Institute Of Technology Kurukshetra India) Mamta, Ms Название: Secure searchable encryption and data management ISBN: 0367619679 ISBN-13(EAN): 9780367619671 Издательство: Taylor&Francis Рейтинг: Цена: 7501.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book provides every necessary detail required to develop the secure searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models which ensures the minimum security requirements for real-world application.
Автор: Gupta, Brij B. Название: Secure Searchable Encryption and Data Management ISBN: 0367706733 ISBN-13(EAN): 9780367706739 Издательство: Taylor&Francis Рейтинг: Цена: 3061.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank transactions. Joshua Holden instead shows how mathematical principles underpin the ways that different codes and ciphers operate. Holden focuses on both code making and code breaking and he discusses the majority of ancient and modern ciphers currently known.
Holden begins by looking at substitution ciphers, built by substituting one letter or block of letters for another. Explaining one of the simplest and historically well-known ciphers, the Caesar cipher, Holden establishes the key mathematical idea behind the cipher and discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, including one developed by the Spartans, connections between ciphers and computer encryption, stream ciphers, and ciphers involving exponentiation. He also examines public-key ciphers, where the methods used to encrypt messages are public knowledge, and yet, intended recipients are still the only ones who are able to read the message. He concludes with a look at the future of ciphers and where cryptography might be headed. Only basic mathematics up to high school algebra is needed to understand and enjoy the book.
With a plethora of historical anecdotes and real-world examples, The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages.
Автор: Borko Furht; Edin Muharemagic; Daniel Socek Название: Multimedia Encryption and Watermarking ISBN: 1441937439 ISBN-13(EAN): 9781441937438 Издательство: Springer Рейтинг: Цена: 23058.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: to Multimedia Security.- Digital Rights Management for Multimedia.- Multimedia Cryptography.- to Multimedia Encryption.- An Overview of Modern Cryptography.- Important Modern Cryptosystems.- Image Encryption Algorithms.- Video Encryption Algorithms.- Speech and Audio Encryption.- Visual and Audio Secret Sharing.- Multimedia Watermarking.- to Watermarking.- Applications of Digital Watermarking.- Digital Watermarking Concepts.- Digital Watermarking and Binary Images.- Two-Level Marks: Design.- Two-Level Marks: Implementations.- Future of Watermarking.
Автор: Peyrin Название: Fast Software Encryption ISBN: 3662529920 ISBN-13(EAN): 9783662529928 Издательство: Springer Рейтинг: Цена: 10342.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the thoroughly refereed post-conference proceedings of the 23rd International Conference on Fast Software Encryption, held in Bochum, Germany, in March 2016. The 29 revised full papers presented were carefully reviewed and selected from 86 initial submissions. The papers are organized in topical sections on operating modes; stream-cipher cryptanalysis; components; side-channels and implementations; automated tools for cryptanalysis; designs; block-cipher cryptanalysis; foundations and theory; and authenticated-encryption and hash function cryptanalysis.
Автор: Koз Зetin Kaya, Цzdemir Funda, Цdemiş Цzger Zeynep Название: Partially Homomorphic Encryption ISBN: 3030876284 ISBN-13(EAN): 9783030876289 Издательство: Springer Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Iorliam Название: Fundamental Computing Forensics for Africa ISBN: 3319944983 ISBN-13(EAN): 9783319944982 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book presents a general introduction to the computational aspects of forensic science, covering the different tools needed for forensic investigations, the importance of forensics and biometrics, and the use of Benford`s law for biometrics and network traffic analysis.
Автор: Eli Biham Название: Fast Software Encryption ISBN: 3540632476 ISBN-13(EAN): 9783540632474 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The proceedings from the Fourth International Workshop on Fast Software Encryption, FSE `97. The papers in this volume are organized in sections on cryptanalysis, blockciphers, stream ciphers, message authentication codes, modes of operation, and fast software encryption.
Автор: Lange Название: Post-Quantum Cryptography ISBN: 3319790625 ISBN-13(EAN): 9783319790626 Издательство: Springer Рейтинг: Цена: 6986.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography, PQCrypto 2018, held in Fort Lauderdale, FL, USA, in April 2018. The 24 revised full papers presented were carefully reviewed and selected from 97 submissions.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru