Computer Science & Engineering

Cryptography & Coding Theory

Per Page:

Guide to Pairing-Based Cryptography

Nadia El Mrabet, Marc Joye
December 08, 2016

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite...

Introduction to Coding Theory, Second Edition

Jurgen Bierbrauer
October 10, 2016

This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary...

Electromagnetic Compatibility: Methods, Analysis, Circuits, and Measurement, Third Edition

David A. Weston
September 29, 2016

Shelving Guide: Electrical Engineering Revised, updated, and expanded, Electromagnetic Compatibility: Methods, Analysis, Circuits, and Measurement, Third Edition provides comprehensive practical coverage of the design, problem solving, and testing of electromagnetic compatibility (EMC) in...

Introduction to Certificateless Cryptography

Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
August 23, 2016

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications...

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
May 13, 2016

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how to prevent such attacks from taking place, and how to react when a DDoS attack is in progress, with...

Mathematical Foundations of Public Key Cryptography

Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
October 21, 2015

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and...

Multilevel Modeling of Secure Systems in QoP-ML

Bogdan Księżopolski
June 10, 2015

In order to perform effective analysis of today’s information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and...

Group Theoretic Cryptography

Maria Isabel González Vasco, Rainer Steinwandt
April 01, 2015

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential...

Practical Cryptography: Algorithms and Implementations Using C++

Saiful Azad, Al-Sakib Khan Pathan
November 17, 2014

Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led to an...

Introduction to Modern Cryptography, Second Edition

Jonathan Katz, Yehuda Lindell
November 06, 2014

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of...

Hardware Security: Design, Threats, and Safeguards

Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
October 29, 2014

Beginning with an introduction to cryptography, Hardware Security: Design, Threats, and Safeguards explains the underlying mathematical principles needed to design complex cryptographic algorithms. It then presents efficient cryptographic algorithm implementation methods, along with...

How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code

David Kahn
January 17, 2014

Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking...