Guide to Pairing-Based Cryptography
Group Theoretic Cryptography
Introduction to Modern Cryptography
Communication System Security
Handbook of Financial Cryptography and Security
Cryptanalysis of RSA and Its Variants
Shiu-Kai Chin, Susan Older
February 15, 2019
This textbook serves the needs of engineers and computer scientists responsible for designing, implementing, and verifying secure computer and information systems. Methods are based on the application of logic as a means for describing, reasoning about, and verifying the properties of systems. We...
Jonathan Katz, Vadim Lyubashevsky
January 15, 2019
The main focus of the book will graduate level courses on the techniques used in obtaining lattice-based cryptosystems. The book will first cover the basics of lattices and then introduce the more advanced material (e.g. Gaussian distributions, sampling, algebraic number theory, etc.) in a “natural...
Richard Klima, Neil Sigmon
November 13, 2018
Nadia El Mrabet, Marc Joye
December 08, 2016
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...
Maria Isabel González Vasco, Rainer Steinwandt
April 01, 2015
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential...
Jonathan Katz, Yehuda Lindell
November 06, 2014
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of...
Lidong Chen, Guang Gong
May 29, 2012
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in...
Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena
January 25, 2012
Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing...
August 02, 2010
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment...
Shiu-Kai Chin, Susan Beth Older
July 26, 2010
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use...
M. Jason Hinek
July 21, 2009
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known...
June 15, 2009
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code...