Narrow your search

Library

KU Leuven (6)

UCLouvain (3)

UHasselt (3)

ULB (3)

AP (2)

KBR (2)

KDG (2)

Odisee (2)

Thomas More Kempen (2)

Thomas More Mechelen (2)

More...

Resource type

book (10)

digital (2)


Language

English (7)

German (4)

Undetermined (1)


Year
From To Submit

2024 (1)

2015 (2)

2007 (4)

2004 (1)

2002 (1)

More...
Listing 1 - 10 of 12 << page
of 2
>>
Sort by

Book
Homology of locally semialgebraic spaces
Author:
ISBN: 3540546154 0387546154 3540384944 9783540546153 Year: 1991 Volume: 1484 Publisher: Berlin: Springer,


Book
Falsche Erinnerungen an sexuellen Missbrauch : die unterschätzte Gefahr. : Familienzerstörung durch Psychotherapie.
Author:
ISBN: 9783991466130 3991466139 Year: 2024 Publisher: Neckenmarkt novum pro Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Introduction to Cryptography : Principles and Applications
Authors: ---
ISBN: 3540492445 Year: 2007 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.

Keywords

Computer security. --- Cryptography. --- Computer networks --- Security measures. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Protection --- Security measures --- Data encryption (Computer science). --- Data structures (Computer scienc. --- Coding theory. --- Number theory. --- Cryptology. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Number Theory. --- Systems and Data Security. --- Data structures (Computer science) --- Number study --- Numbers, Theory of --- Algebra --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data structures (Computer science). --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Locally semialgebraic spaces
Authors: ---
ISBN: 3540160604 0387160604 3540397442 9783540160601 Year: 1985 Volume: 1173 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Introduction to cryptography : principles and applications
Authors: ---
ISBN: 3540422781 3642871283 3540781145 3642871267 9783540422785 Year: 2002 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.


Book
Introduction to Cryptography : Principles and Applications
Authors: ---
ISBN: 3662479737 3662479745 Year: 2015 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.

Introduction to cryptography : principles and applications
Authors: ---
ISBN: 3540492437 9783540492436 Year: 2007 Publisher: Berlin : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Introduction to cryptography : principles and applications
Authors: ---
ISBN: 9783540492443 Year: 2007 Publisher: Berlin Springer


Digital
Introduction to Cryptography : Principles and Applications
Authors: ---
ISBN: 9783662479742 9783662479735 9783662479759 9783662499665 Year: 2015 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. In the second edition the authors added a complete description of the AES, an extended section on cryptographic hash functions, and new sections on random oracle proofs and public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks. The third edition is a further substantive extension, with new topics added, including: elliptic curve cryptography; Paillier encryption; quantum cryptography; the new SHA-3 standard for cryptographic hash functions; a considerably extended section on electronic elections and Internet voting; mix nets; and zero-knowledge proofs of shuffles. The book is appropriate for undergraduate and graduate students in computer science, mathematics, and engineering.


Book
Introduction to Cryptography : Principles and Applications
Authors: --- ---
ISBN: 9783540492443 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises. The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.

Listing 1 - 10 of 12 << page
of 2
>>
Sort by