Filteren
1
Sorteren
53 resultaten
Serie: Information security and cryptography
gebondenEngels446 blz.9783030834104
2e druk
14-10-2021
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. Meer
gebondenEngels9783319961293
23-9-2020
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively – so bringing precise meaning to the intuition that certain information leaks are small enough to be tolerated – and how systems can be constructed that achieve rigorous, quantitative information-flow guarantees in those terms. Meer
paperbackEngels9783642430534
9-11-2014
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. Meer
paperbackEngels9783642265761
2-1-2013
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. Meer
paperbackEngels9783642265938
2-1-2013
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. Meer
gebondenEngels9783642296550
22-6-2012
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Meer
paperbackEngels9783642264504
13-10-2012
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. Meer
paperbackEngels9783642069499
25-11-2010
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze- knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Meer
paperbackEngels9783662525975
27-9-2016
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. Meer
paperbackEngels9783642087820
30-11-2010
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. Meer
paperbackEngels9783642261640
14-3-2012
Computational aspects of geometry of numbers have been revolutionized by the Lenstra–Lenstra–Lovasz ´ lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. Meer
gebondenEngels9783642144516
4-11-2010
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e. Meer
paperbackEngels9783642271113
29-11-2013
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Meer
paperbackEngels9783642080401
30-11-2010
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Meer
gebondenEngels9783642022944
30-11-2009
Computational aspects of geometry of numbers have been revolutionized by the Lenstra–Lenstra–Lovasz ´ lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. Meer
paperbackEngels9783642265778
2-1-2013
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Meer
paperbackEngels9783642265785
2-1-2013
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e. Meer
gebondenEngels9783642143571
4-11-2010
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Meer
gebondenEngels9783642143021
4-11-2010
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. Meer
paperbackEngels9783642436772
18-7-2014
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Meer