Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of …
The twentieth century has been fundamentally shaped by changes in Russia, where disaster in the First World War was followed …
Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for …
After 70 years after independence, the tragic reality of Indian schools is that who we are, where we live, how …
Seven days a week, twenty-four hours a day, electronic databases are compiling information about you. As you surf the Internet, …
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides …
This book systematically explores the statistical characteristics of cryptographic systems, the computational complexity theory of cryptographic algorithms and the mathematical …
Blockchain and other trustless systems have gone from being relatively obscure technologies, which were only known to a small community …
Carbon markets involve complex governance challenges, such as ensuring transparency of emissions, facilitating as well as recording transactions, overseeing market …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
This book intersects the distributed ledger technology (DLT) community with the international security community. Given the increasing application of blockchain …
Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement …
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education …
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its …
This beginning graduate textbook describes both recent achievements and classical results of computational complexity theory. Requiring essentially no background apart …
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of …
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer …