59536b0ccc8f6.jpg
PDF
Complexity and Cryptography

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics.

5950ca7cda925.jpeg
PDF
Kryptologie

Dieses Lehrbuch bietet einen fundierten Überblick über manche klassische hin zu modernen bis zu brandaktuellen kryptografischen Verfahren. Die Voraussetzungen, die ein Leser mitbringen sollte, konzentrieren sich auf wenige Inhalte der linearen Algebra und Analysis, die im ersten Studienjahr vermittelt werden. Das Buch umfasst im Wesentlichen einen Themenkreis, der in einer vierstündigen Vorlesung angesprochen werden kann. Es zeichnet...

5950ca7acf51a.jpg
PDF
Foundations of Cryptography Volume II Basic Applications

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptograph...

002fd8f0_medium
PDF
Cryptography Engineering: Design Principles & Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll le...

41h-Y6QzAeL._SY291_BO1,204,203,200_QL40_
PDF
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not ...

0037c4af_medium
PDF
Number Theoretic Methods in Cryptography: Complexity lower bounds

The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of log...

31saZPGIZPL._SX218_BO1,204,203,200_QL40_
PDF
Handbook of Applied Cryptography

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially i...

51E6QoqRIpL._SX218_BO1,204,203,200_QL40_
PDF
Cryptography in C and C++ (2nd edition)

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primalit...

00285b66_medium
PDF
Modern Cryptography: Theory and Practice by Wenbo Mao

Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" isonly good in an ideal world where data ...

5183SrbEzjL._SX218_BO1,204,203,200_QL40_
PDF
Encyclopedia of Cryptography and Security

The book is primarily intended for use as a college textbook for teaching project management at the advanced undergraduate or master's level. The text is appropriate for classes on the management of service, product, engineering projects, as well as information systems (IS). Thus, we have included some coverage of material concerning information systems and how IS projects differ from and are similar to regular business projects. The...