- Table View
- List View
Cryptography: A Very Short Introduction
by Fred Piper Sean MurphyProvide information about cryptography, gives tips and techniques.
Cryptography: Algorithms, Protocols, and Standards for Computer Security
by Zoubir Z. MammeriCryptography An introduction to one of the backbones of the digital world Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before. This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come. Readers will also find: Over 450 problems with accompanying solutions to reinforce key concepts and test retention Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more Over 200 figures and tables that provide rich detail to the content Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols.
Cryptography: The Key To Digital Security, How It Works, And Why It Matters
by Keith MartinA nuts-and-bolts explanation of cryptography from a leading expert in information security. Despite its reputation as a language only of spies and hackers, cryptography plays a critical role in our everyday lives. Though often invisible, it underpins the security of our mobile phone calls, credit card payments, web searches, internet messaging, and cryptocurrencies—in short, everything we do online. Increasingly, it also runs in the background of our smart refrigerators, thermostats, electronic car keys, and even the cars themselves. As our daily devices get smarter, cyberspace—home to all the networks that connect them—grows. Broadly defined as a set of tools for establishing security in this expanding cyberspace, cryptography enables us to protect and share our information. Understanding the basics of cryptography is the key to recognizing the significance of the security technologies we encounter every day, which will then help us respond to them. What are the implications of connecting to an unprotected Wi-Fi network? Is it really so important to have different passwords for different accounts? Is it safe to submit sensitive personal information to a given app, or to convert money to bitcoin? In clear, concise writing, information security expert Keith Martin answers all these questions and more, revealing the many crucial ways we all depend on cryptographic technology. He demystifies its controversial applications and the nuances behind alarming headlines about data breaches at banks, credit bureaus, and online retailers. We learn, for example, how cryptography can hamper criminal investigations and obstruct national security efforts, and how increasingly frequent ransomware attacks put personal information at risk. Yet we also learn why responding to these threats by restricting the use of cryptography can itself be problematic. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.
Cryptography: Theory and Practice (Fourth Edition) (Textbooks in Mathematics #2012)
by Douglas Robert Stinson Maura Paterson<p>Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography. <p>The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.</p>
Cryptology Transmitted Message Protection: From Deterministic Chaos up to Optical Vortices (Signals and Communication Technology)
by Igor Izmailov Boris Poizner Ilia Romanov Sergey SmolskiyThis book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems)
by Bimal Kumar Roy Atul Chaturvedi Boaz Tsaban Sartaj Ul HasanThe book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2023 (Lecture Notes in Networks and Systems #918)
by Bimal Kumar Roy Atul Chaturvedi Boaz Tsaban Sartaj Ul HasanThe book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27–29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings (Lecture Notes in Computer Science #9476)
by Michael Reiter David NaccacheThis book constitutes the refereed proceedingsof the 14th International Conference on Cryptology and Network Security, CANS2015, held in Marrakesh, Morocco, in December 2015. The 12 full papers presented together with 6short papers were carefully reviewed and selected from numerous submissions. Thepapers cover topics of interest such as internet of things and privacy;password-based authentication; attacks and malicious code; security modelingand verification; secure multi-party computation; and cryptography and VPNs.
Cryptology and Network Security: 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings (Lecture Notes in Computer Science #10052)
by Sara Foresti and Giuseppe PersianoThis book constitutes the refereed proceedings of the 15th International Conference on Cryptology and Network Security, CANS 2016, held in Milan, Italy, in November 2016.The 30 full papers presented together with 18 short papers and 8 poster papers were carefully reviewed and selected from 116 submissions. The papers are organized in the following topical sections: cryptanalysis of symmetric key; side channel attacks and implementation; lattice-based cryptography, virtual private network; signatures and hash; multi party computation; symmetric cryptography and authentication; system security, functional and homomorphic encryption; information theoretic security; malware and attacks; multi party computation and functional encryption; and network security, privacy, and authentication.
Cryptology and Network Security: 16th International Conference, CANS 2017, Hong Kong, China, November 30—December 2, 2017, Revised Selected Papers (Lecture Notes in Computer Science #11261)
by Srdjan Capkun Sherman S. ChowThis book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.
Cryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings (Lecture Notes in Computer Science #11124)
by Jan Camenisch Panos PapadimitratosThis book constitutes the refereed proceedings of the 17th International Conference on Cryptology and Network Security, CANS 2018, held in Naples, Italy, in September/October 2018. The 26 full papers were carefully reviewed and selected from 79 submissions. The papers are organized in the following topical sections: privacy; Internet misbehavior and protection; malware; symmetric key cryptography; signatures; cryptanalysis; cryptographic primitives; and cryptographic protocols.
Cryptology and Network Security: 18th International Conference, CANS 2019, Fuzhou, China, October 25–27, 2019, Proceedings (Lecture Notes in Computer Science #11829)
by Robert H. Deng Xinyi Huang Yi MuThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology and Network Security, CANS 2019, held in Fuzhou, China, in October 2019.The 21 full papers and 8 short papers were carefully reviewed and selected from 55 submissions. The papers focus on topics such as homomorphic encryption; SIKE and Hash; lattice and post-quantum cryptography; searchable encryption; blockchains, cloud security; secret sharing and interval test, LWE; encryption, data aggregation, and revocation; and signature, ML, payment, and factorization.
Cryptology and Network Security: 19th International Conference, CANS 2020, Vienna, Austria, December 14–16, 2020, Proceedings (Lecture Notes in Computer Science #12579)
by Stephan Krenn Serge Vaudenay Haya ShulmanThis book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS 2020, held in Vienna, Austria, in December 2020.*The 30 full papers were carefully reviewed and selected from 118 submissions. The papers focus on topics such as cybersecurity; credentials; elliptic curves; payment systems; privacy-enhancing tools; lightweight cryptography; and codes and lattices. *The conference was held virtually due to the COVID-19 pandemic.
Cryptology and Network Security: 20th International Conference, CANS 2021, Vienna, Austria, December 13-15, 2021, Proceedings (Lecture Notes in Computer Science #13099)
by Mauro Conti Stephan Krenn Marc StevensThis book constitutes the refereed proceedings of the 20th International Conference on Cryptology and Network Security, CANS 2021, which was held during December 13-15, 2021. The conference was originally planned to take place in Vienna, Austria, and changed to an online event due to the COVID-19 pandemic.The 25 full and 3 short papers presented in these proceedings were carefully reviewed and selected from 85 submissions. They were organized in topical sections as follows: Encryption; signatures; cryptographic schemes and protocols; attacks and counter-measures; and attestation and verification.
Cryptology and Network Security: 21st International Conference, CANS 2022, Dubai, United Arab Emirates, November 13–16, 2022, Proceedings (Lecture Notes in Computer Science #13641)
by Arpita Patra Alastair R. Beresford Emanuele BelliniThis book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.
Cryptology and Network Security: 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 – November 2, 2023, Proceedings (Lecture Notes in Computer Science #14342)
by Vladimir Kolesnikov Alexander A. Schwarzmann Jing DengThis book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.
Cryptology and Network Security: 23rd International Conference, CANS 2024, Cambridge, UK, September 24–27, 2024, Proceedings, Part I (Lecture Notes in Computer Science #14905)
by Markulf Kohlweiss Roberto Di Pietro Alastair BeresfordThis two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections:- Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis.
Cryptology and Network Security: 23rd International Conference, CANS 2024, Cambridge, UK, September 24–27, 2024, Proceedings, Part II (Lecture Notes in Computer Science #14906)
by Markulf Kohlweiss Roberto Di Pietro Alastair BeresfordThis two-volume set, LNCS 14905-14906, constitutes the proceedings from the 23rd International Conference on Cryptology and Network Security, CANS 2024, held in Cambridge, United Kingdom during September 24-27, 2024. The 25 papers included in these volumes were carefully reviewed and selected from 76 submissions. The papers presented in these two volumes are organized in the following topical sections:- Part I: Multi-party Computation; Post-quantum Security; Anonymity and Privacy; Blockchain Technology. Part II: Cyber Security and Leakage; Machine Learning and Security; Provable Security; Cryptanalysis.
Cryptology: Classical and Modern (Chapman & Hall/CRC Cryptography and Network Security Series)
by Richard Klima Neil SigmonCryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. <P><P> The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.
Cryptomonedas. Cómo Lucrar Del Bitcoin, Ethereum Para Aprendices
by Michael HoffmanEl libro "Cryptomonedas. Cómo Lucrar del Bitcoin, Ethereum Para Aprendices" es una importante obra de invaluable utilidad para todo aquel que desee comprender en su amplitud el fenómeno de las criptomonedas y las cadenas de bloques, tanto en su composición estructural y su función digital, así como en su fenómeno financiero y su impacto en la humanidad. De un provecho inesperado no debe faltar en la biblioteca del hombre y la mujer de hoy.
Cryptomunten Voor Beginners: Complete Crypto Investeringsgids met alles wat u moet weten over Crypto en Altcoins.
by Nick WoodsIn dit boek zullen we diverse onderwerpen behandelen waardoor u een beter inzicht verkrijgt in de wereld van de cryptomunten. Een Cryptomunt is geen eenduidig begrip maar omvat verschillende digitale munten waarmee u goederen en diensten kan kopen of op zichzelf kan verhandelen. Bijna een derde van investeerders in cryptomunten zijn tussen de 25 en 34 jaar en dat maakt het een populaire investering bij jongere mensen. Nochtans kan iedereen, van welke leeftijd of afkomst ook, een goede opbrengst realiseren door te investeren in deze munten. Cryptomunten bestaan niet in een fysische vorm maar zijn volledig gedigitaliseerd. Dat betekent dat de boekingen van deze munten bewaard en opgeslagen worden in hoog beveiligde virtuele databases. Bijgevolg zijn zij minder vatbaar voor namaak. Door de constante en voortdurende stijging van de populariteit van cryptomunten is hun verhandeling een prima manier geworden om een goede opbrengst te verkrijgen van een financiële investering. U moet het echter wel op de juiste manier doen. We zullen het hebben over de betekenis van cryptomunten en de verschillende types. Naast een beter inzicht in cryptomunten zult u ook leren over de blockchain technologie en hoe deze functioneert. Maar eerst en vooral moet u onthouden dat het best is klein te beginnen eerder dan u hals over kop in de markt te storten. Bouw uw investeringen geleidelijk op terwijl u leert op de markt te handelen. Naarmate u praktische ervaring opdoet kunt u een beslagen en zelfverzekerde investeerder in cryptomunten worden. Voor vele mensen is investeren in cryptomunten een bijverdienste maar het kan het primaire doel worden van hun financiële strategie. Nu de markt van de cryptomunten een globaal hoogtepunt van twee biljoen US dollars heeft bereikt is er voor iedere investeerder ruimte om geld te verdienen en te genieten van de crypto rit.
Crystal Fire: The Invention of the Transistor and the Birth of the Information Age (Sloan Technology Series)
by Michael Riordan Lillian Hoddeson"With impeccable scholarship and meticulous research, this book covers an impressive sweep of history from the discovery of the electron to the first integrated circuit. ... A definitive account of the birth of the semiconductor industry." -London Daily Telegraph "In rich detail, Riordan and Hoddeson unfurl the development of the transistor and the lives of its three principal discoverers- John Bardeen, Walter Brattain, and William Shockley. . . . Standing on the shoulders of giants while harvesting the fruits of their own astonishing research, the triumvirate of the transistor created the device that has revolutionized life today, making possible television, computers, and other electronic devices." -Library Journal
Crystal Programming: A project-based introduction to building efficient, safe, and readable web and CLI applications
by George Dietrich Guilherme BernalThe ultimate guide to Crystal programming covering all its fundamental concepts such as OOP and concurrent programming to help you write readable and safe code and build fast applicationsKey FeaturesThe book uses an example-based approach for a better demonstration of the underlying conceptsDevelop a thorough appreciation of the roles of the macro API and annotationsLeverage supportive tools – spec, documentation, deployment, and automationBook DescriptionCrystal is a programming language with a concise and user-friendly syntax, along with a seamless system and a performant core, reaching C-like speed. This book will help you gain a deep understanding of the fundamental concepts of Crystal and show you how to apply them to create various types of applications.This book comes packed with step-by-step explanations of essential concepts and practical examples. You'll learn how to use Crystal's features to create complex and organized projects relying on OOP and its most common design patterns. As you progress, you'll gain a solid understanding of both the basic and advanced features of Crystal. This will enable you to build any application, including command-line interface (CLI) programs and web applications using IOs, concurrency and C bindings, HTTP servers, and the JSON API.By the end of this programming book, you'll be equipped with the skills you need to use Crystal programming for building and understanding any application you come across.What you will learnExplore how Crystal combines the merits of other languagesUnderstand how to leverage existing C libraries without writing any CFocus on zero-cost abstractions with compile-time macrosUse an example-based approach to demonstrate language featuresDevelop a variety of Crystal applications, such as web and CLI appsGain an understanding of the macro API and annotationsWho this book is forDevelopers who want to learn Crystal programming or anyone looking to improve their ability to solve real-world problems using the language will find this book helpful. Experience in application development using any other programming language is expected. However, prior knowledge of Crystal is not required.
Crystal Reports 10 For Dummies
by Allen G. TaylorWouldyoureadinformationpresentedlikethis?No. It's just not natural. Sometimes presentation is almost as important as content. When you create a report, the goal is to provide information for readers in a format they can readily understand.Crystal Reports 10 For Dummies, the latest version of the most popular report writer in the world, shows you how to create simple or sophisticated reports, turning data into interactive, actionable reports that convey what's happening in your business. You can progress cover-to-cover or use the index to find out how to:Give your reports more pizzazz by using the correct fonts, color, drop shadows, graphic elements, and moreIntegrate elements from multiple, non-database sourcesGroup sort, total result sets, cross-tab reports, and add formulas, charts, or mapsPrint reportsUse customized Business Views gleaned from the same information to provide each reader with information he or she needs to know without spilling all the beans, sales figures, marketing information, or whateverPresent multi-dimensional data in OLAP (Online Analytical Processing) cubesGet ideas from sample reports on the companion Web siteWritten by Allen G. Taylor, nationally known lecturer, teacher, and author of over 20 books, including Database Development for Dummies, Crystal Reports 10 For Dummies makes it crystal clear how to:Store your information securely in Crystal RepositoryUse Crystal Analysis 10 to display OLAP data so you and your report's readers can analyze the information in an online environmentUse Crystal Enterprise to put Crystal Reports online for viewing by hundreds or thousands of people in your organizationWhether you want to dazzle your company's CEO and shareholders, motivate the sales force, or simply share database information cogently, with Crystal Reports 10 For Dummies you not only make your point, you an impression. When your reports look professional, you look professional.
Crystal Reports 2008 For Dummies
by Allen G. TaylorA report is only useful if those who receive it understand what it means. Knowing how to use Crystal Reports gives you the edge in producing reports from your database that really are crystal clear. Crystal Reports 2008 For Dummies is a quick and easy guide to get you going with the latest version of this bestselling report-writing software. In fact, it's so popular that previous editions have made it a bestseller too. Crystal Reports 2008 For Dummies gives you just what you should know to produce the reports you'll need most often, including how to: Pull specific information from your database, sort and group it, and find the details you need Use dynamic or cascading prompts Troubleshoot and print reports and save time with templates View reports on your LAN Write formulas to retrieve specific information Create and update OLAP reports Format reports, control page breaks, and even add graphics or Flash files Enhance your reports with charts and maps Use Crystal Reports in the enterprise There's also a companion Web site with sample reports from the book and links to sites with more related information. With Crystal Reports 2008 For Dummies by your side, you'll soon be able to create reports from simple to spectacular, whenever the need arises.