Cryptography and Network Security For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is …
An accessible introduction to cybersecurity concepts and practicesCybersecurity Essentialsprovides a comprehensive introduction to the field, with expert coverage of essential …
Distributed ledgers, decentralization and smart contracts explained About This Book Get to grips with the underlying technical principles and implementations …
This book, by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail …
What are the global implications of the looming shortage of Internet addresses and the slow deployment of the new IPv6 …
This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held …
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, …
The magnificent, unrivaled history of codes and ciphers -- how they
". . .the best introduction to cryptography I've ever seen. . . . The book the National Security Agency wanted …
What do flashlights, the British invasion, black cats, and seesaws have to do with computers? In CODE, they show us …
This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away …
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction …
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario …
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
This book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this …
The Joy of Cryptography is an undergraduate textbook in cryptography. This book grew out of lecture notes I developed for …
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography―the science of sending secret messages. …
This book provides a brief and accessible introduction to the theory of finite fields and to some of their many …
Discover how to take advantage of common cryptographic operations to build safer apps that respect users' privacy with the help …
This book is a clear and informative introduction to cryptography and data protection--subjects of considerable social and political importance. It …
Key FeaturesGet to grips with the underlying technical principles and implementations of blockchain.Build powerful applications using Ethereum to secure transactions …
Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic …
A Programming and Coding Math Book for Little Ones and Math Lovers from the 1 Science Author
A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it …
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters …
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key …
Computer Security, 5th Edition features a balanced presentation of both principles and practice. It incorporates broad and comprehensive coverage of …
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security …
How the blockchain—a system built on foundations of mutual mistrust—can become trustworthy.The blockchain entered the world on January 3, 2009, …
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) …
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the …
Will your organization be protected the day a quantum computer breaks encryption on the internet?Computer encryption is vital for protecting …
This book does not contain any useful information. It contains a lot of bar charts and brochure-like market descriptions that …