This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away …
In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its …
". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted …
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us …
This beginning graduate textbook describes both recent achievements and classical results of computational complexity theory. Requiring essentially no background apart …
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail …
This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held …
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction …
Cryptography and Network Security For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is …
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario …
Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of …
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic …
The magnificent, unrivaled history of codes and ciphers -- how they
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
This book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this …
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
This book provides a brief and accessible introduction to the theory of finite fields and to some of their many …
Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help …
Developers tasked with security problems are often not cryptographers themselves. They are bright people who, with careful guidance, can implement …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Key FeaturesGet to grips with the underlying technical principles and implementations of blockchain.Build powerful applications using Ethereum to secure transactions …
Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic …
Distributed ledgers, decentralization and smart contracts explained About This Book Get to grips with the underlying technical principles and implementations …
What are the global implications of the looming shortage of Internet addresses and the slow deployment of the new IPv6 …
A Programming and Coding Math Book for Little Ones and Math Lovers from the 1 Science Author
A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it …
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security …
How the blockchain—a system built on foundations of mutual mistrust—can become trustworthy.The blockchain entered the world on January 3, 2009, …