Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Algebraic geometry --- Algebraic topology --- Algebraic spaces --- Algebraische ruimten --- Espaces algébriques --- Homologie --- Homology theory --- Algebraic spaces. --- 51 --- Mathematics --- 51 Mathematics --- Cohomology theory --- Contrahomology theory --- Spaces, Algebraic --- Geometry, Algebraic --- Homology theory.
Choose an application
Choose an application
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
Computer security. --- Cryptography. --- Computer networks --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Protection --- Security measures --- Data encryption (Computer science). --- Data structures (Computer scienc. --- Coding theory. --- Number theory. --- Cryptology. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Number Theory. --- Systems and Data Security. --- Data structures (Computer science) --- Number study --- Numbers, Theory of --- Algebra --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer science). --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
Algebraic geometry --- Algebraic topology --- 51 --- Mathematics --- Algebraic spaces. --- Categories (Mathematics) --- Homotopy theory. --- Categories (Mathematics). --- 51 Mathematics
Choose an application
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
Mathematical control systems --- Programming --- Computer science --- cryptografie --- Cryptography --- Cryptographie --- Computer security --- Computer networks --- Security measures --- Cryptography. --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Cryptology. --- Coding and Information Theory. --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer networks - Security measures
Choose an application
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data structures (Computer science). --- Computer science --- Number theory. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Number Theory. --- Systems and Data Security. --- Mathematics of Computing. --- Mathematics. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Number study --- Numbers, Theory of --- Algebra --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Security measures --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer science—Mathematics. --- Information theory. --- Data protection. --- Data and Information Security. --- Computer mathematics --- Mathematics --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Communication theory --- Communication --- Cybernetics
Choose an application
Computer networks --- Computer security. --- Cryptography. --- Security measures.
Choose an application
Number theory --- Ergodic theory. Information theory --- Computer science --- Computer architecture. Operating systems --- Information systems --- coderen --- DES (data encryption standard) --- cryptografie --- cryptologie --- programmatielogica --- computerbeveiliging --- getallenleer --- informatietheorie
Choose an application
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.
Number theory --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- informatica --- externe fixatie (geneeskunde --- informatietechnologie --- wiskunde --- computerbeveiliging --- getallenleer
Choose an application
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
Number theory --- Ergodic theory. Information theory --- Computer science --- Computer architecture. Operating systems --- Information systems --- coderen --- DES (data encryption standard) --- cryptografie --- cryptologie --- programmatielogica --- computerbeveiliging --- getallenleer --- informatietheorie
Listing 1 - 10 of 12 | << page >> |
Sort by
|