Narrow your search
Listing 1 - 10 of 420 << page
of 42
>>
Sort by

Periodical
IACR Transactions on Symmetric Cryptology
Author:
ISSN: 2519173X Year: 2016 Publisher: Bochum, Germany: : Ruhr-Universität Bochum,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Modern Cryptography : Current Challenges and Solutions
Author:
ISBN: 1789844711 1789844703 Year: 2019 Publisher: London : IntechOpen,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Partially homomorphic encryption
Authors: --- ---
ISBN: 3030876292 3030876284 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Cryptography : recent advances and future developments
Author:
ISBN: 183962566X 1839625651 Year: 2021 Publisher: London, England : IntechOpen,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Periodical
Cryptologia.
Authors: --- ---
ISSN: 15581586 Year: 1977 Publisher: Laguna Hills, Calif. : Aegean Park Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Kahn on codes : secrets of the new cryptology
Author:
ISBN: 0025606409 Year: 1983 Publisher: New York (N.Y.): Macmillan

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Energie, Entropie, Information, Cryptographie et Cybersecurite
Author:
ISBN: 2759823490 9782759823499 9782759823338 Year: 2019 Publisher: Les Ulis : EDP Sciences,

Loading...
Export citation

Choose an application

Bookmark

Abstract

L’énergie et l’information jouent un rôle important dans les sociétés modernes. Ces deux domaines ont un point commun : l’entropie. Celle-ci est reliée à l’irréversibilité des transformations énergétiques et permet de quantifier l’information pour mieux la traiter. La thermodynamique permet de comprendre les échanges de travail et de chaleur à l’échelle macroscopique. La physique statistique et la mécanique quantique en donnent une compréhension microscopique. Énergie, thermodynamique, physique statistique et mécanique quantique sont introduits à un niveau élémentaire. L’information occupe une place de plus en plus importante dans les sociétés modernes. Un message doit pouvoir être transmis rapidement, en toute sécurité, sans modification et en toute confidentialité. Ceci nécessite d’évaluer la quantité d’information qu’il contient pour coder celle-ci afin qu’il occupe le moins de place possible avant de le transmettre. Il faut être capable de détecter et corriger les erreurs toujours présentes lors de sa transmission et en assurer sa confidentialité (cryptographie). Ces points sont abordés dans plusieurs chapitres de cet ouvrage qui se termine par des notions de cybersécurité car outre les erreurs accidentelles existant lors de la transmission d’un message, il existe de plus en plus d’actions malveillantes visant à l’intercepter, le détruire, le modifier ou en prendre connaissance. Plus d’une centaine d’exercices avec un corrigé détaillé complètent l’ouvrage et permettent au lecteur de vérifier ses connaissances ou de les compléter.


Book
Recent Advances in Cryptography and Network Security
Author:
ISBN: 1789843464 1838816283 1789843456 Year: 2018 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the field of computers and with the advent of the internet, the topic of secure communication has gained significant importance. The theory of cryptography and coding theory has evolved to handle many such problems. The emphases of these topics are both on secure communication that uses encryption and decryption schemes as well as on user authentication for the purpose of non-repudiation. Subsequently, the topics of distributed and cloud computing have emerged. Existing results related to cryptography and network security had to be tuned to adapt to these new technologies. With the more recent advancement of mobile technologies and IOT (internet of things), these algorithms had to take into consideration the limited resources such as battery power, storage and processor capabilities. This has led to the development of lightweight cryptography for resource constrained devices. The topic of network security also had to face many challenges owing to variable interconnection topology instead of a fixed interconnection topology. For this reason, the system is susceptible to various attacks from eavesdroppers. This book addresses these issues that arise in present day computing environments and helps the reader to overcome these security threats.


Book
Applied Cryptography and Network Security
Author:
ISBN: 9535156829 9535102184 Year: 2012 Publisher: IntechOpen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography will continue to play important roles in developing of new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. This book discusses some of the critical security challenges faced by today's computing world and provides insights to possible mechanisms to defend against these attacks. The book contains sixteen chapters which deal with security and privacy issues in computing and communication networks, quantum cryptography and the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography. It will be useful for researchers, engineers, graduate and doctoral students working in cryptography and security related areas. It will also be useful for faculty members of graduate schools and universities.


Book
Secure multi-party computation
Authors: --- ---
ISBN: 1299333397 1614991693 9781614991694 1614991685 9781614991687 9781614991687 9781299333390 Year: 2013 Volume: 10 Publisher: Amsterdam Washington IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Secure Multi-Party Computation (MPC) is one of the most powerful tools developed by modern cryptography: it facilitates collaboration among mutually distrusting parties by implementing a virtual trusted party. Despite the remarkable potential of such a tool, and decades of active research in the theoretical cryptography community, it remains a relatively inaccessible and lesser-known concept outside of this field. Only a handful of resources are available to students and researchers wishing to learn more about MPC. The editors of this book have assembled a comprehensive body of basic and advanced material on MPC, authored by experts in the field. It will serve as a starting point for those interested in pursuing research related to MPC, whether they are students learning about it for the first time or researchers already working in the area. The book begins with tutorials introducing the concept of MPC and zero-knowledge proofs, an important theoretical platform where many of the concepts central to MPC were shaped. The remaining chapters deal with classical as well as recent MPC protocols, and a variety of related topics. Each chapter is self-contained and can be read independently of the others.

Listing 1 - 10 of 420 << page
of 42
>>
Sort by