Will your organization be protected the day a quantum computer breaks encryption on the internet? Computer encryption is vital for …
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, …
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or …
The Fifth Edition of one of the standard works on number theory, written by internationally-recognized mathematicians. Chapters are relatively self-contained …
Elementary Methods in Number Theory begins with "a first course in number theory" for students with no previous knowledge of …
In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic …
Number theory is one of the oldest and most appealing areas of mathematics. Computation has always played a role in …
Quantum information and computation is a rapidly expanding and cross-disciplinary subject. This book gives a self-contained introduction to the field …
This is a pedagogical introduction to the subjects of quantum information and computation. Topics include non-locality of quantum mechanics, quantum …
This multi-authored textbook addresses graduate students with a background in physics, mathematics or computer science. No research experience is necessary. …
This book is an introduction to the two closely related subjects of quantum optics and quantum information. Essentially, the physical …
Research and development in the pioneering field of quantum computing involve just about every facet of science and engineering, including …
The classic guide to network and Internet security has been thoroughly updated for today's latest security threats. In the second …
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers …
This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is …
Please Read Notes: Brand New, International Softcover Edition, Printed in black and white pages, minor self wear on the cover …
This is a textbook about classical elementary number theory and elliptic curves. The first part discusses elementary topics such as …
This book is mainly devoted to some computational and algorithmic problems in finite fields such as, for example, polynomial factorization, …
This book constitutes the proceedings of the satellite workshops held around the 17th International Conference on Applied Cryptography and Network …
This book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied Cryptography and Network …
"Google's algorithms assume the world's future is nothing more than the next moment in a random process. George Gilder shows …
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, …
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice …
This book constitutes the carefully refereed and revised selected papers of the 5th Canada-France ETS Symposium on Foundations and Practice …
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for …
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network …