5966db211ccb3.jpg
PDF
Broadband Quantum Cryptography

Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for security from numerical complexity to the fundamental physical nature of the communic...

595f3007de590.jpg
PDF
Security Solutions and Applied Cryptography in Smart Grid Communications

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across ...

595da1539fa0d.jpeg
PDF
Cryptography and Security Services

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and Applications addresses cryptography from the perspective of the security services and mechanisms av...

595c8daba47e8.jpg
PDF
Progress in Cryptology -- INDOCRYPT 2014

This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protec...

595b0313297ec.jpeg
PDF
A Cryptography Primer: Secrets and Promises

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for ...

595a12ad9dc72.jpeg
PDF
Secret Language: Codes, Tricks, Spies, Thieves, and Symbols

With revelations on every page, and sample codes and puzzles for the reader to crack, Secret Language will entertain everyone with an urge to know more about the most arcane and curious uses of language. From backmasking to the Enigma Machine, from magic words to literary symbols, here is a lively, engaging tour of languages that hide their meanings from all but a chosen few. Blake explains the difference between ciphers and codes an...

595887bd50399.jpg
PDF
Non-Commutative Cryptography and Complexity of Group-Theoretic Problems

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public-key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of th...

5955cf4ac75e5.jpeg
PDF
Cryptography: An Introduction, 3rd Edition

Nigel Smart's "Cryptography" provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.

5955cf4954b03.jpg
PDF
Cryptographic Hardware and Embedded Systems - CHES 2004

This book constitutes the refereed proceedings of the 6th International workshop on Cryptographic Hardware and Embedded Systems, CHES 2004, held in Cambridge, MA, USA in August 2004. The 32 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on side channels, modular multiplication, low resources, implementation aspects, collision attacks, fault attacks...

595488afe20be.jpg
PDF
CompTIA Security+ All-in-One Exam Guide

Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help yo...