Cryptology: Classical and Modern
Guide to Pairing-Based Cryptography
Group Theoretic Cryptography
Introduction to Modern Cryptography
Communication System Security
Handbook of Financial Cryptography and Security
Cryptanalysis of RSA and Its Variants
Introduction to Network Security
April 24, 2020
Eschewing the standard dry and static writing style of traditional textbooks, Discrete Explorations provides a refreshing approach to discrete mathematics. The author combines traditional course topics with popular culture, applications, and various historical examples. This book focuses on the...
Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon
December 03, 2018
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and...
Nadia El Mrabet, Marc Joye
December 08, 2016
This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...
Maria Isabel González Vasco, Rainer Steinwandt
April 01, 2015
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential...
Jonathan Katz, Yehuda Lindell
November 06, 2014
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of...
Lidong Chen, Guang Gong
May 29, 2012
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in...
Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena
January 25, 2012
Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing...
August 02, 2010
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment...
Shiu-Kai Chin, Susan Beth Older
July 26, 2010
Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use...
M. Jason Hinek
July 21, 2009
Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known...
June 15, 2009
Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code...
November 18, 2008
Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or...