583243a26dd18.jpeg
PDF
Elliptic Curves in Cryptography

In the past few years elliptic curve cryptography has moved from a fringe activity to a major system in the commercial world. This timely work summarizes knowledge gathered at Hewlett-Packard over a number of years and explains the mathematics behind practical implementations of elliptic curve systems. Since the mathematics is advanced, a high barrier to entry exists for individuals and companies new to this technology. Hence, this b...

582ab426a8de0.jpeg
PDF
Foundations of Cryptography: Basic Tools

Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It focuses on the basic mathematical tools: computational difficulty (one-way functions), pseudorandomness and zero-knowledge pro...

5825840dae84c.jpeg
PDF
Cryptography and Secure Communication

Today's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new. Major branches of classical and modern cryptography are discussed in detail, from basic block ...

582326d60dfce.jpeg
PDF
Algebraic Coding Theory, Revised Edition

This is the revised edition of Berlekamp's famous book, "Algebraic Coding Theory", originally published in 1968, wherein he introduced several algorithms which have subsequently dominated engineering practice in this field. One of these is an algorithm for decoding Reed-Solomon and Bose–Chaudhuri–Hocquenghem codes that subsequently became known as the Berlekamp–Massey Algorithm. Another is the Berlekamp algorithm for factoring polyno...

5822e6d09969a.jpeg
PDF
Visual Cryptography and Secret Image Sharing

With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and sharing-control mechanisms used to protect against unauthorized data access and secure di...

58202c9eb1b0b.jpg
PDF
Algebraic Curves in Cryptography

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduat...

581bf65141add.jpeg
PDF
Code Breaking: A History and Exploration

The achievements of cryptography, the art of writing and deciphering coded messages, have become a part of everyday life, especially in our age of electronic banking and the Internet. In Code Breaking , Rudolf Kippenhahn offers readers both an exciting chronicle of cryptography and a lively exploration of the cryptographer’s craft. Rich with vivid anecdotes from a history of coding and decoding and featuring three new chapters, this ...

5818a890ab84c.jpg
PDF
Algebraic Curves and Finite Fields: Cryptography and Other Applications

This book collects the results of the workshops on Applications of Algebraic Curves and Applications of Finite Fieldsat the RICAMin 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world, addressing old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.

5815f9b2de235.jpeg
PDF
Handbook of Applied Cryptography (Discrete Mathematics and Its Applications)

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially i...

5815f9ad2563d.jpeg
PDF
Codes: The Guide to Secrecy From Ancient to Modern Times by Richard A. Mollin

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptol...