Home | Amazing | Today | Tags | Publishers | Years | Search 
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Distributed Programming Paradigms with Cryptography Applications
Distributed Programming Paradigms with Cryptography Applications
This monograph describes a programming methodology based upon programming paradigms and generic programs and demonstates how distributed application programs can be developed by simple substitution of data structures and sequential procedures. The author introduces generic programs for two paradigms and shows how to derive new distributed programs...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
CCSE NG: Check Point Certified Security Expert Study Guide
CCSE NG: Check Point Certified Security Expert Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
Secure Communicating Systems: Design, Analysis, and Implementation
Secure Communicating Systems: Design, Analysis, and Implementation
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into a practical...
Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data
Hands-On Cryptography with Python: Leverage the power of Python to encrypt and decrypt data

Learn to evaluate and compare data encryption methods and attack cryptographic systems

Key Features

  • Explore popular and important cryptographic methods
  • Compare cryptographic modes and understand their limitations
  • Learn to perform attacks on cryptographic...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy