580c0dc42ceeb.jpeg
PDF
Quantum Information, Computation and Communication

Quantum physics allows entirely new forms of computation and cryptography, which could perform tasks currently impossible on classical devices, leading to an explosion of new algorithms, communications protocols and suggestions for physical implementations of all these ideas. As a result, quantum information has made the transition from an exotic research topic to part of mainstream undergraduate courses in physics. Based on years of...

580c0dc2b801e.jpeg
PDF
An Introduction to Cryptography, Second Edition

Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter...

580bdbe3516ad.jpeg
PDF
Protecting Information: From Classical Error Correction to Quantum Cryptography

For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from mathematics and physics meet. By covering such topics as Shor's quantum factoring algorithm, this text informs the reader about ...

580ad9904b9be.jpeg
PDF
Cryptography: Cracking Codes

While cracking a code might seem like something few of us would encounter in our daily lives, it is actually far more prevalent than we may realize. Anyone who has had personal information taken because of a hacked email account can understand the need for cryptography and the importance of encryptionessentially the need to code information to keep it safe. This detailed volume examines the logic and science behind various ciphers, t...

580ad98e9d894.jpeg
PDF
Foundations of Cryptography: Volume 2, Basic Applications

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptograph...

58085767f01c3.jpeg
PDF
Break the Code: Cryptography for Beginners

No, it's not a message from outer space! Just read it backwards, starting from the bottom line, to discover what this specially coded message says. (The extra letter "X" at the beginning was thrown in just to make the message a bit more mysterious.) Codes have been used for centuries. Now, with the help of this entertaining book, you, too, will be able to decipher dozens of secret messages. Veteran cryptographer Bud Johnson not only ...

58085766b22de.jpeg
PDF
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including imp...

5804c64f2f998.jpeg
PDF
Computational Number Theory and Modern Cryptography

The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author t...

5804c64e13702.jpg
PDF
Arithmetic, Geometry, Cryptography and Coding Theory

This volume contains the proceedings of the 11th conference on AGC2T, held in Marseilles, France in November 2007. There are 12 original research articles covering asymptotic properties of global fields, arithmetic properties of curves and higher dimensional varieties, and applications to codes and cryptography. This volume also contains a survey article on applications of finite fields by J.-P. Serre. AGC2T conferences take place in...

565b21acdf81e.jpeg
PDF
Coding and Cryptology

There are two basic methods of error control for communication, both involving coding of the messages. With forward error correction, the codes are used to detect and correct errors. In a repeat request system, the codes are used to detect errors and, if there are errors, request a retransmission. Error detection is usually much simpler to implement than error correction and is widely used. However, it is given a very cursory treatme...