5183SrbEzjL._SX218_BO1,204,203,200_QL40_
PDF
Encyclopedia of Cryptography and Security

The book is primarily intended for use as a college textbook for teaching project management at the advanced undergraduate or master's level. The text is appropriate for classes on the management of service, product, engineering projects, as well as information systems (IS). Thus, we have included some coverage of material concerning information systems and how IS projects differ from and are similar to regular business projects. The...

51aeOogAKhL._SX218_BO1,204,203,200_QL40_
PDF
Malicious Cryptography: Exposing Cryptovirology

Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first identified cryptovirology show you exactly what you’re up against and how to fight back. They will tak...

41KPWE5+fsL._SX218_BO1,204,203,200_QL40_
PDF
Guide to Elliptic Curve Cryptography (Springer Professional Computing)

After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation ...

41TccmGfFxL._SX218_BO1,204,203,200_QL40_
PDF
Cryptographic Security Architecture: Design and Verification

Presents a novel design that allows for a great deal of customization, which many current methods fail to include; Details a flexible, comprehensive design that can be easily extended when necessary; Proven results: the versatility of the design has been effectively tested in implementations ranging from microcontrollers to supercomputers

00312a19_medium
PDF
CryptoGraphics: Exploiting Graphics Cards For Security

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

41VciYwh6zL._SY291_BO1,204,203,200_QL40_
PDF
Progress in Cryptology - AFRICACRYPT 2014

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, ...

0031306e_medium
PDF
Applied Quantum Cryptography

Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography – or better Quantum Key Distribution – was the domain of basic research laboratories at universities. But during the last few years things changed. Quantum Key Distribution or QKD left the laboratories and was picked up by more...

111141dAOpMOqtL._SY291_BO1,204,203,200_QL40_
PDF
Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications

This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in vi...

00317dca_medium
PDF
Number Story: From Counting to Cryptography

Peter Higgins distills centuries of work into one delightful narrative that celebrates the mystery of numbers and explains how different kinds of numbers arose and why they are useful. Full of historical snippets and interesting examples, the book ranges from simple number puzzles and magic tricks, to showing how ideas about numbers relate to real-world problems. This fascinating book will inspire and entertain readers across a range...

2331131313132
PDF
Abenteuer Kryptologie

Die dritte Auflage des Standardwerks ist wesentlich überarbeitet und aktualisiert worden. Neu ist u.a. der Rijndael-Algorithmus, die DES-Crack-Maschine der EFF, praktisch wirksame Angriffe auf Handy-Authentifizierung, mehr Details zu ECHELON, Überlegungen zur Biometrie etc.