BOOK SERIES


Chapman & Hall/CRC Cryptography and Network Security Series


10 Series Titles

Per Page
Sort

Display
Certified Security by Design Using Higher Order Logic

Certified Security by Design Using Higher Order Logic

Forthcoming

Shiu-Kai Chin, Susan Older
January 15, 2018

This textbook serves the needs of engineers and computer scientists responsible for designing, implementing, and verifying secure computer and information systems. Methods are based on the application of logic as a means for describing, reasoning about, and verifying the properties of systems. We...

Guide to Pairing-Based Cryptography

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Group Theoretic Cryptography

Group Theoretic Cryptography

Maria Isabel González Vasco, Rainer Steinwandt
April 01, 2015

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential...

Introduction to Modern Cryptography, Second Edition

Introduction to Modern Cryptography, Second Edition

Jonathan Katz, Yehuda Lindell
November 06, 2014

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of...

Communication System Security

Communication System Security

Lidong Chen, Guang Gong
May 29, 2012

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in...

Handbook on Soft Computing for Video Surveillance

Handbook on Soft Computing for Video Surveillance

Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena
January 25, 2012

Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing...

Handbook of Financial Cryptography and Security

Handbook of Financial Cryptography and Security

Burton Rosenberg
August 02, 2010

The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions, electronic voting, micropayment...

Access Control, Security, and Trust: A Logical Approach

Access Control, Security, and Trust: A Logical Approach

Shiu-Kai Chin, Susan Beth Older
July 26, 2010

Developed from the authors’ courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use...

Cryptanalysis of RSA and Its Variants

Cryptanalysis of RSA and Its Variants

M. Jason Hinek
July 21, 2009

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known...

Algorithmic Cryptanalysis

Algorithmic Cryptanalysis

Antoine Joux
June 15, 2009

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code...

AJAX loader