Subcategories

Cryptography with Shrinking Generators (Repost)

Posted By: DZ123
Cryptography with Shrinking Generators (Repost)

Sara Díaz Cardell, Amparo Fúster-Sabater, "Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation"
English | 2019 | ISBN: 3030128490 | PDF | pages: 109 | 1.7 mb

The "Essence" of Network Security: An End-to-End Panorama

Posted By: AvaxGenius
The "Essence" of Network Security: An End-to-End Panorama

The "Essence" of Network Security: An End-to-End Panorama by Mohuya Chakraborty
English | PDF | 2021 | 308 Pages | ISBN : 9811593167 | 8.5 MB

This edited book provides an optimal portrayal of the principles and applications related to network security. The book is thematically divided into five segments: Part A describes the introductory issues related to network security with some concepts of cutting-edge technologies; Part B builds from there and exposes the readers to the digital, cloud and IoT forensics; Part C presents readers with blockchain and cryptography techniques; Part D deals with the role of AI and machine learning in the context of network security. And lastly, Part E is written on different security networking methodologies.

Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications

Posted By: First1
Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications

Mastering Blockchain: Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications by Lorne Lantz, Daniel Cawrey
English | December 8th, 2020 | ISBN: 1492054704 | 284 pages | EPUB | 12.68 MB

The future will be increasingly distributed. As the publicity surrounding Bitcoin and blockchain has shown, distributed technology and business models are gaining popularity. Yet the disruptive potential of this technology is often obscured by hype and misconception. This detailed guide distills the complex, fast moving ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood.

Applications of Algebra to Communications, Control, and Signal Processing

Posted By: AvaxGenius
Applications of Algebra to Communications, Control, and Signal Processing

Applications of Algebra to Communications, Control, and Signal Processing by Nigel Boston
English | PDF | 2012 | 56 Pages | ISBN : 1461438624 | 1.5 MB

Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO communications is just Hamilton's quaternions in disguise and has spawned the use of PhD-level algebra to produce generalizations. Likewise, in the absence of credible alternatives, the industry has in many cases been forced to adopt elliptic curve cryptography.

Provable and Practical Security

Posted By: AvaxGenius
Provable and Practical Security

Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings by Khoa Nguyen
English | PDF | 2020 | 426 Pages | ISBN : 3030625753 | 11.9 MB

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held in Singapore, in November 2020. The 20 full papers presented were carefully reviewed and selected from 59 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: signature schemes, encryption schemes and NIZKS, secure machine learning and multiparty computation, secret sharing schemes, and security analyses.

Making, Breaking Codes: Introduction to Cryptology

Posted By: interes
Making, Breaking Codes: Introduction to Cryptology

Making, Breaking Codes: Introduction to Cryptology by Paul Garrett
English | 2001 | ISBN: 0130303690 | 542 pages | scan PDF | 43 MB

Contact Tracing in Post-Covid World: A Cryptologic Approach

Posted By: AvaxGenius
Contact Tracing in Post-Covid World: A Cryptologic Approach

Contact Tracing in Post-Covid World: A Cryptologic Approach by Pranab Chakraborty
English | PDF,EPUB | 2020 | 149 Pages | ISBN : 981159726X | 2.9 MB

This book is a timely document of state-of-the-art techniques in the domain of contact tracing applications. Well known in the field of medical science, this topic has recently received attention from governments, industries and academic communities due to the COVID-19 pandemic.

End-to-End Encrypted Messaging

Posted By: readerXXI
End-to-End Encrypted Messaging

End-to-End Encrypted Messaging
by Rolf Oppliger
English | 2020 | ISBN: 1630817325 | 359 Pages | PDF | 2.33 MB

Human-Centric Computing in a Data-Driven Society

Posted By: AvaxGenius
Human-Centric Computing in a Data-Driven Society

Human-Centric Computing in a Data-Driven Society: 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, Tokyo, Japan, September 9–11, 2020, Proceedings by David Kreps
English | PDF | 2020 | 415 Pages | ISBN : 3030628027 | 21.5 MB

This book constitutes the refereed proceedings of the 14th IFIP TC 9 International Conference on Human Choice and Computers, HCC14 2020, which was supposed take place in Tokyo, Japan, in September 2020, but the conference was cancelled due to the COVID-19 crisis.

Modulare Arithmetik: Von den ganzen Zahlen zur Kryptographie

Posted By: AvaxGenius
Modulare Arithmetik: Von den ganzen Zahlen zur Kryptographie

Modulare Arithmetik: Von den ganzen Zahlen zur Kryptographie by Thorsten Holm
Deutsch | EPUB | 2020 | 51 Pages | ISBN : 3658319453 | 0.6 MB

Dieses essential bietet eine Einführung in die modulare Arithmetik, die mit wenig Vorkenntnissen zugänglich und mit vielen Beispielen illustriert ist. Ausgehend von den ganzen Zahlen und dem Begriff der Teilbarkeit werden neue Zahlbereiche bestehend aus Restklassen modulo einer Zahl n eingeführt.

Cryptological Mathematics

Posted By: DZ123
Cryptological Mathematics

Robert Edward Lewand, "Cryptological Mathematics"
English | 2000 | ISBN: 0883857197 | PDF | pages: 216 | 16.8 mb

Security, Privacy, and Applied Cryptography Engineering (Repost)

Posted By: step778
Security, Privacy, and Applied Cryptography Engineering (Repost)

Anupam Chattopadhyay, Chester Rebeiro, Yuval Yarom, "Security, Privacy, and Applied Cryptography Engineering"
English | 2018 | pages: 248 | ISBN: 3030050718 | PDF | 14,3 mb

Logic, Language, and Security

Posted By: AvaxGenius
Logic, Language, and Security

Logic, Language, and Security: Essays Dedicated to Andre Scedrov on the Occasion of His 65th Birthday by Vivek Nigam
English | EPUB | 2020 | 208 Pages | ISBN : 303062076X | 14.4 MB

This Festschrift is in honor of Prof. Andre Scedrov at the University of Pennsylvania. Scedrov has laid the foundations for a number of now well-established domains in mathematics and computer science including Proof Theory, Logic in Computer Science, Foundations in Computer Security, and Linguistics.

Modulare Arithmetik: Von den ganzen Zahlen zur Kryptographie

Posted By: roxul
Modulare Arithmetik: Von den ganzen Zahlen zur Kryptographie

Thorsten Holm, "Modulare Arithmetik: Von den ganzen Zahlen zur Kryptographie"
Deutsch | ISBN: 3658319453 | 2020 | 52 pages | PDF | 1 MB

Mobile Wireless Middleware, Operating Systems and Applications

Posted By: AvaxGenius
Mobile Wireless Middleware, Operating Systems and Applications

Mobile Wireless Middleware, Operating Systems and Applications: 9th EAI International Conference, MOBILWARE 2020, Hohhot, China, July 11, 2020, Proceedings by Wuyungerile Li
English | PDF | 2020 | 230 Pages | ISBN : 3030622045 | 23.1 MB

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, Operating Systems and Applications, MOBILWARE 2020, held in Hohhot, China, in July 2020. Due to COVID-19 pandemic the conference was held virtually.