Subcategories

Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography, 2 edition

Posted By: interes
Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography, 2 edition

Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography, 2 edition by Celine Carstensen-Opitz, Benjamin Fine, et al.
English | 2019 | ISBN: 3110603934 | 421 pages | PDF | 7 MB

Lattice-Based Public-Key Cryptography in Hardware

Posted By: AvaxGenius
Lattice-Based Public-Key Cryptography in Hardware

Lattice-Based Public-Key Cryptography in Hardware by Sujoy Sinha Roy
English | PDF(Repost),EPUB | 2020 | 109 Pages | ISBN : 9813299932 | 7.25 MB

This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post quantum PKC and homomorphic encryption schemes whose security is based on the hardness of the ring-learning with error (LWE) problem. The work includes designing an FPGA-based accelerator to speed up computation on encrypted data in the cloud computer. It also proposes a more practical scheme that uses a special module called recryption box to assist homomorphic function evaluation, roughly 20 times faster than the implementation without this module.

Number Theory in Science and Communication, Fifth Edition (Repost)

Posted By: AvaxGenius
Number Theory in Science and Communication, Fifth Edition (Repost)

Number Theory in Science and Communication: With Applications in Cryptography, Physics, Digital Information, Computing, and Self-Similarity , Fifth Edition by Manfred Schroeder
English | PDF | 2009 | 424 Pages | ISBN : 3540852972 | 8.87 MB

"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and useful branch of applied mathematics . It stresses intuitive understanding rather than abstract theory and highlights important concepts such as continued fractions, the golden ratio, quadratic residues and Chinese remainders, trapdoor functions, pseudoprimes and primitive elements. Their applications to problems in the real world are one of the main themes of the book. This revised fifth edition is augmented by recent advances in coding theory, permutations and derangements and a chapter in quantum cryptography.

Hardware‐Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography (Repost)

Posted By: AvaxGenius
Hardware‐Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography (Repost)

Hardware‐Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography by Roger Dube
English | PDF | 2008 | 241 Pages | ISBN : 0470193395 | 13.51 MB

Presents primary hardware-based computer security approaches in an easy-to-read toolbox format
Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.

A Course in Cryptography

Posted By: readerXXI
A Course in Cryptography

A Course in Cryptography
by Heiko Knospe
English | 2019 | ISBN: 1470450550 | 344 Pages | PDF | 2.93 MB

Cryptanalytic Attacks on RSA (Repost)

Posted By: insetes
Cryptanalytic Attacks on RSA (Repost)

Cryptanalytic Attacks on RSA By Song Y. Yan
2007 | 275 Pages | ISBN: 0387487417 | PDF | 2 MB

Coding and Cryptology

Posted By: AvaxGenius
Coding and Cryptology

Coding and Cryptology: Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings by Yeow Meng Chee
English | PDF | 2011 | 302 Pages | ISBN : 3642209009 | 4.23 MB

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Boolean Functions and Their Applications in Cryptography (Repost)

Posted By: DZ123
Boolean Functions and Their Applications in Cryptography (Repost)

Chuan-Kun Wu, Dengguo Feng, "Boolean Functions and Their Applications in Cryptography"
English | 2016 | ISBN: 3662488639 | PDF | pages: 256 | 1.7 mb

Ethereum – Grundlagen und Programmierung: Smart Contracts und DApps entwickeln

Posted By: ksveta6
Ethereum – Grundlagen und Programmierung: Smart Contracts und DApps entwickeln

Ethereum – Grundlagen und Programmierung: Smart Contracts und DApps entwickeln by Andreas M. Antonopoulos, Gavin Wood
2019 | ISBN: 3960091109 | Deutsch | 428 pages | True PDF | 10 MB

Introduction to Cryptography (Repost)

Posted By: AvaxGenius
Introduction to Cryptography (Repost)

Introduction to Cryptography by Johannes A. Buchmann
English | PDF | 2004 | 342 Pages | ISBN : 038721156X | 20.99 MB

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms.

Security for Wireless Sensor Networks using Identity-Based Cryptography

Posted By: DZ123
Security for Wireless Sensor Networks using Identity-Based Cryptography

Harsh Kupwade Patil, Stephen A. Szygenda, "Security for Wireless Sensor Networks using Identity-Based Cryptography"
English | 2012 | ISBN: 1439869014 | PDF | pages: 230 | 3.1 mb

Cryptography and Coding: 15th IMA International Conference, IMACC 2015

Posted By: roxul
Cryptography and Coding: 15th IMA International Conference, IMACC 2015

Jens Groth, "Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings "
English | ISBN: 3319272381 | 2015 | 340 pages | EPUB, PDF | 6 MB + 6 MB

Progress in Cryptology -- INDOCRYPT 2015: 16th International Conference on Cryptology

Posted By: roxul
Progress in Cryptology -- INDOCRYPT 2015: 16th International Conference on Cryptology

Alex Biryukov, "Progress in Cryptology – INDOCRYPT 2015: 16th International Conference on Cryptology"
English | ISBN: 3319266160 | 2015 | 392 pages | EPUB, PDF | 8 MB + 18 MB

Cryptographic Hardware and Embedded Systems -- CHES 2015

Posted By: roxul
Cryptographic Hardware and Embedded Systems -- CHES 2015

Tim Güneysu, "Cryptographic Hardware and Embedded Systems – CHES 2015: 17th International Workshop"
English | ISBN: 3662483238 | 2015 | 720 pages | EPUB, PDF | 11 MB + 56 MB

Information Security and Cryptology: 10th International Conference, Inscrypt 2014

Posted By: roxul
Information Security and Cryptology: 10th International Conference, Inscrypt 2014

Dongdai Lin, "Information Security and Cryptology: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014,"
English | ISBN: 3319167448 | 2015 | 564 pages | EPUB, PDF | 12 MB + 29 MB