Coding theory and cryptology Books

221 products


  • Provable and Practical Security: 16th

    Springer International Publishing AG Provable and Practical Security: 16th

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 16th International Conference on Provable Security, ProvSec 2022, held in Nanjing, China, in November 11–12,2022. The 15 full papers and 4 short papers were presented carefully reviewed and selected from 52 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Encryption; Lattice Based Cryptography; Information Security; Blockchain; and Foundations.Table of ContentsEncryption.- A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.- Secure-Channel Free Certificateless Searchable Public key Authenticated Encryption with Keyword Search.- More Efficient Verifiable Functional Encryption.- Subverting Deniability.- Epoch Confidentiality in Updatable Encryption.- Lattice Based Cryptography.- Simplified Server-Aided Revocable Identity-Based Encryption from Lattices.- Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask.- Batched Fully Dynamic Multi-key FHE from FHEW-like Cryptosystems.- Zero-knowledge Range Arguments for Signed Fractional Numbers from Lattices.- Information Security.- Fast Out-of-band Data Integrity Monitor to Mitigate Memory Corruption Attacks.- Construction of a New UAV Management System based on UMIA Technology.- FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.- Practical Federated Learning for Samples with Different IDs.- Blockchain.- Reinforcement-Mining: Protecting Reward in Selfish Mining.- FolketID: A Decentralized Blockchain-based NemID Alternative against DDosS Attacks.- Secure Collaboration between Consortiums in Permissioned Blockchains.- Foundations.- (Public) Verifiability For Composable Protocols Without Adaptivity Or Zero-Knowledge.- Practical Non-Malleable Codes from Symmetric-key Primitives in 2-Split-State Model.- Cryptographic Role-Based Access Control, Reconsidered.

    1 in stock

    £47.49

  • Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings

    Springer International Publishing AG Secure IT Systems: 27th Nordic Conference, NordSec 2022, Reykjavic, Iceland, November 30–December 2, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 27th Nordic Conference on Secure IT Systems, NordSec 2022, held in Reykjavic, Iceland, during November 30 – December 2, 2022. The 20 full papers presented in this volume were carefully reviewed and selected from 89 submissions. The NordSec conference series addresses a broad range of topics within IT security and privacy.Table of ContentsOn the Effectiveness of Intersection Attacks in Anonymous Microblogging.- Data Privacy in Ride-Sharing Services: From an Analysis of Common Practices to Improvement.- Location Privacy, 5G AKA, and Enhancements.- Local Differential Privacy for Private Construction of Classification Algorithms.- IMSI Probing: Possibilities and Limitations.- Honeysweeper: Towards stealthy honeytoken fingerprinting techniques.- Towards Self-Monitoring Enclaves: Side-Channel Detection using Performance Counters.- DeCrypto: Finding Cryptocurrency Miners on ISP networks.- Detection of Voice Conversion Spoofing Attacks using Voiced Speech.- A Wide Network Scanning for Discovery of UDP-Based Reflectors in the Nordic Countries.- GPU-FAN: Leaking Sensitive Data From Air-Gapped Machines via Covert Noise from GPU Fans.- Simplex: Repurposing Intel Memory Protection Extensions for Secure Storage.- Automatic Implementations Synthesis of Secure Protocols and Attacks from Abstract Models.- How to Avoid Repetitions in Lattice-based Deniable Zero-Knowledge Proofs.- Obfuscation-resilient Semantic Functionality Identification Through Program Simulation.- Malware Analysis with Symbolic Execution and Graph Kernel.- WearSec: Towards Automated Security Evaluation of Wireless Wearable Devices.- Maraudrone’s Map: An Interactive Web Application for Forensic Analysis and Visualization of DJI Drone Log Data.- VinciDecoder: Automatically Interpreting Provenance Graphs into Textual Forensic Reports with Application to OpenStack. Actionable Cyber Threat Intelligence for Automated Incident Response.

    1 in stock

    £56.99

  • Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III

    Springer International Publishing AG Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part III

    Out of stock

    Book SynopsisThe three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.Table of ContentsVerifiable Private Information Retrieval.- Random-Index Oblivious RAM.- On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR.- Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.- One-Time Programs from Commodity Hardware.- Universal Reductions: Reductions Relative to Stateful Oracles.- Permissionless Clock Synchronization with Public Setup.- Beyond Uber: Instantiating Generic Groups via PGGs.

    Out of stock

    £47.49

  • Advances in Cryptology – ASIACRYPT 2022: 28th

    Springer International Publishing AG Advances in Cryptology – ASIACRYPT 2022: 28th

    1 in stock

    Book SynopsisThe four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.Table of ContentsIsogeny Based Cryptography.- Homomorphic Encryption.- NIZK and SNARKs.- Non Interactive Zero Knowledge.- and Symmetric Cryptography.

    1 in stock

    £75.99

  • Microelectronic Devices, Circuits and Systems: Third International Conference, ICMDCS 2022, Vellore, India, August 11–13, 2022, Revised Selected Papers

    Springer International Publishing AG Microelectronic Devices, Circuits and Systems: Third International Conference, ICMDCS 2022, Vellore, India, August 11–13, 2022, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the Third International Conference on Microelectronic Devices, Circuits and Systems, ICMDCS 2022, was held in Vellore, India, in August 2022.The 9 full papers and 5 short paper presented in this volume were carefully reviewed and selected from 84 submissions. The papers are organized in the following topical sections: System Level Design; Digital Design; Analog, Mixed-Signal and RF Design; and Emerging Technologies.Table of Contents​System Level Design.- Tapered Fed Modified Patch Antenna for SWB Communications using DGS.- Design of Hardware Accelerator for Facial Recognition System using Convolutional Neural Networks based on FPGA.- Digital Design.- Advanced TSV-BIST Repair Technique to target the Yield and Test challenges in 3-D Stacked IC’s.- Redundancy allocation problem evaluation using interval-based GA and PSO for multi-core system consisting of one instruction cores.- Design of Low Powered and High Speed Compressor based Multiplier.-A Route Planning for Idyllic Coverage in Sensor Networks with Efficient Area Coverage.- Low Power Mod 2 Synchronous Counter Design using Modified Gate Diffusion Input Technique.- Analog, Mixed-Signal and RF Design.- A novel blind zone free, low power phase frequency detector for fast locking of charge pump phase locked loops.- Performance Improvement of H-Shaped Antenna for Wireless Local Area Networks.- Emerging Technologies.- Real-Time Rainfall Prediction System using IoT and Machine Learning.- Performance Analysis of Image Caption Generation using Deep Learning Techniques.- The Heroes and Villains of the Mix Zone: The Preservation and Leaking of User’s Privacy in Future Vehicles.- Analysis and Design of High Speed and Low Power Finite Impulse Response Filter using Different Types of Multipliers.- MPPT using P&O algorithm for Solar-Battery powered Electric Vehicle.

    1 in stock

    £56.99

  • Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers

    Springer International Publishing AG Digital Forensics and Watermarking: 21st International Workshop, IWDW 2022, Guilin, China, November 18-19, 2022, Revised Selected Papers

    Out of stock

    Book SynopsisThis book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.Table of ContentsSteganology.- High-Performance Steganographic Coding Based on Sub-Polarized Channel.- High-Capacity Adaptive Steganography Based on Transform Coefficient for HEVC.- Forensics and Security Analysis.- SE-ResNet56: Robust Network Model for Deepfake Detection.- Voice Conversion Using Learnable Similarity-Guided Masked Autoencoder.- Visual Explanations for Exposing Potential Inconsistency of Deepfakes.- Improving the Transferability of Adversarial Attacks through Both Front and Rear Vector Method.- Manipulated Face Detection and Localization Based on Semantic Segmentation.- Deep Learning Image Age Approximation - What is more Relevant: Image Content or Age Information?.- Watermarking.- Physical Anti-Copying Semi-Robust Random Watermarking for QR Code.- Robust and Imperceptible Watermarking Scheme for GWAS Data Traceability.- Adaptive Robust Watermarking Method Based on Deep Neural Networks.- Adaptive Despread Spectrum-Based Image Watermarking for Fast Product Tracking.- Reversible Data Hiding via Arranging Blocks of Bit-Planes in Encrypted Images.- High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology.

    Out of stock

    £47.49

  • Smart Card Research and Advanced Applications: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers

    Springer International Publishing AG Smart Card Research and Advanced Applications: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers

    Out of stock

    Book SynopsisThis book constitutes the proceedings of the 21st International Conference on Smart Card Research and Advanced Applications, CARDIS 2022, which took place in November 2022. The conference took place in Birmingham, United Kingdom. The 15 full papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections named: physical attacks; physical countermeasures; protecting AES; evaluation methodologies; attacking NTRU; next-generation cryptography.Table of Contents​Physical Attacks.- Time’s a Thief of Memory: Breaking Multi-tenant Isolation in TrustZones through Timing based Bidirectional Covert Channels.- Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing.- A Practical Introduction to Side-Channel Extraction of Deep Neural Network Parameters.- Physical Countermeasures.- A Nearly Tight Proof of Duc et al.s Conjectured Security Bound for Masked Implementations.- Short-Iteration Constant-Time GCD and Modular Inversion.- Protecting AES.- Guarding the First Order: The Rise of AES Maskings.- Rivain-Prouff on Steroids: Faster and Stronger Masking of the AES.- Self-Timed Masking: Implementing Masked S-Boxes Without Registers.- Evaluation Methodologies.- An Evaluation Procedure for Comparing Clock Jitter Measurement Methods.- Comparing Key Rank Estimation Methods.- Cycle-Accurate Power Side-Channel Analysis Using the ChipWhisperer: a Case Study on Gaussian Sampling.- Attacking NTRU.- Reveal the Invisible Secret: Chosen-Ciphertext Side-Channel Attacks on NTRU.- Security Assessment of NTRU Against Non-Profiled SCA.- Next-Generation Cryptography.- Post-Quantum Protocols for Banking Applications.- Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists.

    Out of stock

    £47.49

  • Quantenkommunikationsnetze

    Springer Fachmedien Wiesbaden Quantenkommunikationsnetze

    1 in stock

    Book SynopsisDieses Buch bietet ein Tutorial über Quantenkommunikationsnetze. Die Autoren erörtern aktuelle Paradigmenwechsel in Kommunikationsnetzen, die erforderlich sind, um die einfachen Transportkonzepte der vorherrschenden Netze um Rechen- und Speicherfunktionen zu ergänzen. Sie zeigen, wie diese "softwarisierten" Lösungen neue Wege beschreiten, um Latenzzeiten zu reduzieren und die Ausfallsicherheit zu erhöhen. Die Autoren erörtern, wie diese Lösungen trotz der ihnen innewohnenden Probleme aufgrund der eingeführten Rechenlatenz und des Energieverbrauchs durch hybride klassisch-quantische Kommunikationsnetze gelöst werden können. Das Buch bringt Quantennetzwerke, Quanteninformationstheorie, Quantencomputer und Quantensimulation zusammen.Table of ContentsEinführung.- Grundlegender Hintergrund.- Quantencomputing und Programmierung.- Quanteninformationstheorie.- Quantenfehlerkorrektur.- Quantenkommunikationsnetze- Quantenkommunikationsnetze: Entwurf und Simulation.- Quantenkommunikationsnetze: Abschließende Betrachtungen und Anwendungsfälle.

    1 in stock

    £85.49

  • Code-Based Cryptography: 10th International

    Springer International Publishing AG Code-Based Cryptography: 10th International

    5 in stock

    Book SynopsisThis book constitutes the proceedings of the 10th International Workshop on Code-Based Cryptography, CBCrypto 2022, which was held during May 29-30, 2022 in Trondheim, Norway.The 8 papers presented in this volume were carefully reviewed and selected from 23 submissions. These contributions span all aspects of code-based cryptography, from design to software and hardware implementations, works about recent NIST PQC standardization candidates, side channel analysis, and improved decoding techniques.Table of ContentsDistinguishing and Recovering Generalized Linearized ReedSolomon Codes.- Verifying Classic McEliece: examining the role of formal methods in post-quantum cryptography standardisation.- Key-Recovery Fault Injection Attack on the Classic McEliece KEM.- Towards Automating Cryptographic Hardware Implementations: a Case Study of HQC.- Software Implementation of a Code-Based Key Encapsulation Mechanism from Binary QD Generalized Srivastava Codes.- On Decoding High-Order Interleaved Sum-Rank-Metric Codes.- Information Set Decoding for Lee-Metric Codes using Restricted Balls.- Cryptanalysis of IvanovKroukZyablov cryptosystem

    5 in stock

    £42.74

  • Privacy and Identity Management

    Springer International Publishing AG Privacy and Identity Management

    Out of stock

    Book SynopsisThis book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022. The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions.

    Out of stock

    £53.99

  • Classical and Modern Cryptography for Beginners

    Springer International Publishing AG Classical and Modern Cryptography for Beginners

    Out of stock

    Book SynopsisThis textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms

    Out of stock

    £49.49

  • Progress in Cryptology - AFRICACRYPT 2023: 14th

    Springer International Publishing AG Progress in Cryptology - AFRICACRYPT 2023: 14th

    Out of stock

    Book SynopsisThis volume contains the papers accepted for presentation at Africacrypt 2023, the 14th International Conference on the Theory and Application of Cryptographic Techniques in Africa. The 21 full papers included in this book were carefully reviewed and selected from 59 submissions. They were organized in topical sections as follows: Post-quantum cryptography; Symmetric cryptography; Cryptanalysis; Blockchain; Lattice-based cryptography; Implementations; Theory. Table of Contents​Post-quantum cryptography.- MinRank in the Head: Short Signatures from Zero-Knowledge Proofs.- Take your MEDS: Digital Signatures from Matrix Code Equivalence.- Efficient computation of (3^n,3^n)-isogenies.- On the Post-Quantum Security of Classical Authenticated Encryption Schemes.- A Side-Channel Attack against Classic McEliece when loading the Goppa Polynomial.- Symmetric cryptography.- Universal hashing based on field multiplication and (near-)MDS matrices.- Invertible Quadratic Non-Linear Functions over F_p^n via Multiple Local Maps.- Poseidon2: A Faster Version of the Poseidon Hash Function.- From Unbalanced to Perfect: Implementation of Low Energy Stream Ciphers.- Cryptanalysis.- The special case of cyclotomic fields in quantum algorithms for unit groups.- Improved Cryptanalysis of the Multi-Power RSA Cryptosystem Variant.- Blockchain.- The curious case of the half-half Bitcoin ECDSA nonces.- Maravedí: A Secure and Practical Protocol to Trade Risk for Instantaneous Finality.- Lattice-based cryptography.- ComBo: a Novel Functional Bootstrapping Method for Efficient Evaluation of Nonlinear Functions in the Encrypted Domain.- Concrete Security from Worst-Case to Average-Case Lattice Reductions.- Finding and Evaluating Parameters for BGV.- Quantum Search-to-Decision Reduction for the LWE Problem.- Implementations.- Fast Falcon Signature Generation and Verification Using ARMv8 NEON Instructions.- Benchmarking and Analysing the NIST PQC Lattice-Based Signature Schemes Standards on the ARM Cortex M7.- Theory.- Impossibilities in Succinct Arguments: Black-box Extraction and More.- Applications of Timed-release Encryption with Implicit Authentication.

    Out of stock

    £69.99

  • Advances in Cryptology – CRYPTO 2023: 43rd Annual

    Springer International Publishing AG Advances in Cryptology – CRYPTO 2023: 43rd Annual

    1 in stock

    Book SynopsisThe five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

    1 in stock

    £85.49

  • Linking Theory and Practice of Digital Libraries:

    Springer International Publishing AG Linking Theory and Practice of Digital Libraries:

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 27th International Conference on Linking Theory and Practice of Digital Libraries, TPDL 2023, held in Zadar, Croatia, during September 26–29, 2023.The 13 full papers and 17 short papers included in this book were carefully reviewed and selected from 69 submissions. They were organized in topical sections as follows: Applications and digital library systems; data citation and citation analysis; discovering science, monitoring and publishing science; knowledge creation; Human-Computer Interaction; digital humanities; and digital cultural heritage. Table of ContentsApplications and Digital Library Systems.- Human-in-the-loop Latent Space Learning for Bibrecord-based Literature Management.- Holistic Graph-based Document Representation and Management for Open Science.- A Multilingual Dashboard To Analyse Intercultural Knowledge Circulation.- Applications and Digital Library Systems.- Known by the Company it Keeps: Proximity-Based Indexing for Physical Content in Archival Repositories.- Aspect-Driven Structuring of Historical Dutch Newspaper Archives.- PreprintResolver: Improving Citation Quality by Resolving Published Versions of ArXiv Preprints using Literature Databases.- Data Citation and Citation Analysis.- How to Cite a Web Ranking and Make it FAIR.- Tracing Data Footprints: Formal and Informal Data Citations in the Scientific Literature.- Non-citable but not uncited: a large-scale citation analysis of editorials.- BIP! NDR (NoDoiRefs): A Dataset of Citations From Papers Without DOIs in Computer Science Conferences and Workshops.- Investigating the Relation between Authors’ Academic Age and their Citations.- Discovering science.- On Retraction Cascade? Citation Intention Analysis as a Quality Control Mechanism in Digital Libraries.- Using Semi-Automatic Annotation Platform to create Corpus for Argumentative Zoning.- CORE-GPT: Combining Open Access research and large language models for credible, trustworthy question answering.- A Robust Approach for Hybrid Personalized Recommender Systems.- Readability Measures as Predictors of Understandability and Engagement in Searching to Learn.- Classification of Visualization Types and Perspectives in Patents.- Monitoring and Publishing science.- It’s Not Just GitHub: Identifying Data and Software Sources Included in Publications.- A Graph Neural Network Approach for Evaluating Correctness of Groups of Duplicates.- Synthesizing Web Archive Collections Into Big Data: Lessons From Mining Data From Web Archives.- A Comparison of Automated Journal Recommender Systems.- Making PDFs Accessible for Visually Impaired Users (and Findable for Everybody Else).- Knowledge creation.- Multi-view Graph-based Text Representations for Imbalanced Classification.- Large Synthetic Data from the arχiv for OCR Post Correction of Historic Scientific Articles.- Human-Computer Interaction.- From textual to visual image searching: User experience of advanced image search tool.- Ranking for Learning: Studying Users’ Perceptions of Relevance, Understandability, and Engagement.- Digital Humanities.- Image Modification Modeled as a Storytelling Process.- From ISAD(G) to Linked Data Archival Descriptions.- Detection of Redacted Text in Legal Documents.- The First Tile for the Digital Onomastic Repertoire of the French Medieval Romance: Problems and Perspectives.- Digital Cultural Heritage.- Digital Cultural Heritage.- Persistent identifier usage by cultural heritage institutions: a study on the Europeana.eu dataset.- Real Experienced Needs for Accessible and Inclusive Cultural Heritage – First Results in MuseIT.

    1 in stock

    £49.49

  • Stabilization, Safety, and Security of

    Springer International Publishing AG Stabilization, Safety, and Security of

    1 in stock

    Book SynopsisThis book constitutes the proceedings of 25th International Symposium, SSS 2023, in Jersey City, NJ, USA, in October 2023.The 32 full papers presented together with 8 short papers were carefully reviewed and selected from 78 submissions. The conference was organized into five tracks reflecting major trends related to the conference: (i) Track A. Self-stabilizing Systems: Theory and Practice, (ii) Track B. Distributed and Concurrent Computing: Foundations, Fault-Tolerance and Scalability, (iii) Track C. Cryptogrophy and Security, (iv) Track D. Dynamic, Mobile and Nature-Inspired Computing Mobile Agents, (v) and Distributed Databases.Table of ContentsDistributed computing methodologies.- Software fault tolerance.- Ad hoc networks.- Security and privacy.- Software safety.- Software reliability.- Mobile networks.- Dependable and fault-tolerant systems and networks.- Concurrent computing methodologies.

    1 in stock

    £66.49

  • Provable and Practical Security: 17th

    Springer International Publishing AG Provable and Practical Security: 17th

    3 in stock

    Book SynopsisThis volume LNCS 14217 constitutes the refereed proceedings of the 17th International Conference on Provable and Practical Security, ProvSec 2023, held in Wuhan, China, during October 2023. The 20 full papers presented together with 3 short papers were carefully reviewed and selected from 71 submissions. The conference focuses on Fundamentals & Cryptographic Primitives; Cryptanalysis; Signature; Encryption; Privacy Preservation; and Blockchain Security.Table of Contents​Fundamentals & Cryptographic Primitives.- Efficient Zero-Knowledge Arguments for Matrix Relations over Rings and Non-malleable Enhancement.- Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.- Signcryption-based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.- Cryptanalysis.- Improved Key-Recovery Attacks under Imperfect SCA Oracle for Latticebased KEMs.- Linear Cryptanalysis of Lightweight Block Cipher WARP.- Linicrypt in the Ideal Cipher Model.- Signature.- SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature between PKI and IBC.- Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.- A Certificateless Aggregate Signature Scheme with Better Security.- Constant-size Group Signatures with Message-Dependent Opening from Lattices.- Post-quantum Sigma Protocols and Signatures from Low-Rank Matrix Completions.- Threshold Ring Signature Scheme from Cryptographic Group Action.- Encryption.- Homomorphic Witness Encryption from Indistinguishable Obfuscation.- Identity-based Matchmaking Encryption Secure against Key Generation Center.- Multi-Input Functional Encryption for Unbounded Inner Products.- FleS: a compact and parameter-flexible supersingular isogeny based public key encryption scheme.- A New Revocable Attribute Based Encryption on Lattice.- An efficient keyword-based ciphertext retrieval scheme.- Privacy Preservation.- Privacy Preserving Outsourced K-means Clustering using Kd-tree.- Fuzzy Deduplication Scheme Supporting Pre-verification of Label Consistency.- A Privacy-Preserving Takeaway Delivery Service Scheme.- Blockchain Security.- CDRF: A Detection Method of Smart Contract Vulnerability Based on Random Forest.- simuBits: Pool Security Verification of Novel Mining Attacks.

    3 in stock

    £61.74

  • Code-Based Cryptography: 11th International

    Springer International Publishing AG Code-Based Cryptography: 11th International

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 11th International Conference on Code-Based Cryptography, CBCrypto 2023, held in Lyon, France, during April 22–23, 2023. The 8 full papers included in this book were carefully reviewed and selected from 28 submissions. The conference offers a wide range of many important aspects of code-based cryptography such as cryptanalysis of existing schemes, the proposal of new cryptographic systems and protocols as well as improved decoding algorithms.

    1 in stock

    £42.74

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsProofs and outsourcing.- theoretical foundations.- multi-party computation.

    1 in stock

    £66.49

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsMulti-party computation.- encryption.- secret sharing, PIR and memory.

    1 in stock

    £61.74

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    1 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsAnonymity, surveillance and tampering; lower bounds; IOPs and succinctness.

    1 in stock

    £66.49

  • Theory of Cryptography: 21st International

    Springer International Publishing AG Theory of Cryptography: 21st International

    3 in stock

    Book SynopsisThe four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. Table of ContentsLattices.- quantum cryptography.- group-based cryptography.- Byzantine agreement, consensus and composability.

    3 in stock

    £66.49

  • Bent Functions and Permutation Methods

    Springer International Publishing AG Bent Functions and Permutation Methods

    1 in stock

    Book SynopsisThis book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing books on bent functions refer to just binary bent functions. The approach presented is based on the observation that given certain bent functions, many other bent functions can be constructed by manipulating them.

    1 in stock

    £40.49

  • Advances in Cryptology  CRYPTO 2024

    Springer Advances in Cryptology CRYPTO 2024

    3 in stock

    Book SynopsisDigital signatures.- Cloud cryptography.- Consensus protocols.- Key exchange.- Public key encryption.- Public-key cryptography with advanced functionalities.- Time-lock cryptography.- Symmetric cryptanalysis.- Symmetric cryptograph.- Mathematical assumptions.- Secret sharing.- Theoretical foundations.- Cryptanalysis.- New primitives.- Side-channels and leakage.- Quantum cryptography.- Threshold cryptography.- Multiparty computation.- Private information retrieval.- Zero-knowledge.- Succinct arguments.

    3 in stock

    £58.49

  • Security and Cryptography for Networks

    Springer Security and Cryptography for Networks

    3 in stock

    Book Synopsis

    3 in stock

    £53.99

  • Theory of Cryptography

    Springer Theory of Cryptography

    1 in stock

    Book SynopsisProofs.- Math and Foundations.- Consensus and Messaging.- Quantum.- Kolmogorov and OWFs.- Encryption.- Quantum and Black-Box and Separations.- Authentication and Sequentiality.- Obfuscation and Homomorphism.- Multi-Party Computation.- Information-Theoretic Cryptography.- Secret Sharing.

    1 in stock

    £61.74

  • Financial Cryptography and Data Security

    1 in stock

    £53.99

  • FaultTolerant Distributed Consensus in

    Springer FaultTolerant Distributed Consensus in

    5 in stock

    Book SynopsisIntroduction to fault tolerant distributed consensus.- Preliminaries.- EIG protocol for reliable broadcast.- Efficient consensus protocols.- Domain extension for consensus protocols with perfect security.- Lower Bound on the resilience of Byzantine agreement without any set up.- Byzantine broadcast with a trusted PKI set up.- Domain extension for consensus protocols with cryptographic and statistical security.- Lower bound for the number of rounds for deterministic consensus protocols.- Randomized consensus protocols.- Instantiating common-coin and leader election from scratch.- Lower Bound on the Message Complexity of Consensus/Broadcast.

    5 in stock

    £98.99

  • Springer Advances in Cryptology EUROCRYPT 2025

    1 in stock

    Book Synopsis

    1 in stock

    £62.99

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisMathematical Foundations and Isogeny-Based Cryptography.- Code-Based Cryptography.- Lattice-Based Cryptography.- Complexity-Theoretic Foundations.

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisConsensus and Blockchain.- Quantum Cryptography.

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisAdvanced Encryption Schemes.- Key Exchange and Generation.

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisSecure Computation.- Secure Computation.

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisSignatures and Anonymous Credentials.- Commitments.

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book Synopsis

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisObfuscation.- Proof Systems.

    1 in stock

    £58.49

  • Springer Advances in Cryptology CRYPTO 2025

    1 in stock

    Book SynopsisMessaging.- Outsourced Computation.- Federated Learning.

    1 in stock

    £58.49

  • Electronic Voting

    Springer Electronic Voting

    1 in stock

    1 in stock

    £31.49

  • Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    Springer International Publishing AG Foundations and Practice of Security: 6th International Symposium, FPS 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers

    15 in stock

    Book SynopsisThis book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.Table of ContentsOn the Efficiency of Mathematics in Intrusion Detection: The NetEntropy Case.- On the Feasibility of a Censorship Resistant Decentralized Naming System.- A General Framework for Group Authentication and Key Exchange Protocols.- Modelling Simultaneous Mutual Authentication for Authenticated Key Exchange.- Model-Based Specification and Validation of Security and Dependability Patterns.- Enforcing Information Flow by Combining Static and Dynamic Analysis.- Fault Injection to Reverse Engineer DES-like Cryptosystems.- Software Camouflage.- Investigation of Parameters Influencing the Success of Optical Fault Attacks.- ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework.- Quantitative Evaluation of Enforcement Strategies.- Collusion Resistant Inference Control for Cadastral Databases.- Leveraging Ontologies upon a Holistic Privacy-Aware Access Control Model.- Formal Modelling of Content-Based Protection and Release for Access Control in NATO Operations.- Computational Soundness of Symbolic Blind Signatures under Active Attacker.- Improved Davies-Murphys Attack on DES Revisited.- Yet Another Fault-Based Leakage in Non-Uniform Faulty Ciphertexts.- A Hierarchal Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs.- A More Realistic Model For Verifying Route Validity in Ad-Hoc Networks.- On the Security of a Privacy-Preserving Key Management Scheme for Location Based Services in VANETs.- CheR: Cheating Resilience in the Cloud via Smart Resource Allocation.- Evaluation of Software-Oriented Block Ciphers on Smartphones.- Don’t Push it: Breaking iButton Security.- Discovering Flaws in IDS through Analysis of their Inputs.- On the Reverse Engineering of the Citadel Botnet.- The Carna Botnet Through the Lens of a Network Telescope.

    15 in stock

    £42.74

  • Network Coding and Subspace Designs

    Springer International Publishing AG Network Coding and Subspace Designs

    1 in stock

    Book SynopsisThis book, written by experts from universities and major research laboratories, addresses the hot topic of network coding, a powerful scheme for information transmission in networks that yields near-optimal throughput. It introduces readers to this striking new approach to network coding, in which the network is not simply viewed as a mechanism for delivering packets, but rather an algebraic structure named the subspace, which these packets span. This leads to a new kind of coding theory, employing what are called subspace codes. The book presents selected, highly relevant advanced research output on: Subspace Codes and Rank Metric Codes; Finite Geometries and Subspace Designs; Application of Network Coding; Codes for Distributed Storage Systems. The outcomes reflect research conducted within the framework of the European COST Action IC1104: Random Network Coding and Designs over GF(q). Taken together, they offer communications engineers, R&D engineers, researchers and graduate students in Mathematics, Computer Science, and Electrical Engineering a comprehensive reference guide to the construction of optimal network codes, as well as efficient encoding and decoding schemes for a given network code.Table of ContentsSubspace Codes and Rank Metric Codes.- Finite Geometries and Subspace Designs.- Application of Network Coding.- Codes For Distributed Storage Systems.

    1 in stock

    £80.99

  • Symmetrische Verschlüsselungsverfahren: Design,

    Springer Fachmedien Wiesbaden Symmetrische Verschlüsselungsverfahren: Design,

    1 in stock

    Book SynopsisEnigma und Lucifer-Chiffre: das spannende Lehrbuch zur Kryptographie mit Online-Service. Es wird detailliert beschrieben, was bei der Entwicklung eines symmetrischen Kryptosystems - das den heutigen Anforderungen entspricht - zu berücksichtigen ist. Dazu wird insbesondere die differentielle und die lineare Kryptoanalyse ausführlich erklärt.Table of ContentsKryptoanalyse klassischer Chiffrierverfahren - Die Kryptoanalyse der 'Enigma'-Chiffre - Shannons Theorie der Kryptosysteme - Lucifer-Chiffre und der Data Encryption Standard - Differentielle Kryptoanalyse - Lineare Kryptoanalyse - Advanced Encryption Standard - Mathematische Grundlagen

    1 in stock

    £34.19

  • Information and the Internal Structure of the

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Information and the Internal Structure of the

    1 in stock

    Book SynopsisNot so if the book has been translated into Arabic. Now the reader can discern no meaning in the letters. The text conveys almost no information to the reader, yet the linguistic informa­ tion contained by the book is virtually the same as in the English original. The reader, familiar with books will still recognise two things, however: First, that the book is a book. Second, that the squiggles on the page represent a pattern of abstractions which probably makes sense to someone who understands the mean­ ing of those squiggles. Therefore, the book as such, will still have some meaning for the English reader, even if the content of the text has none. Let us go to a more extreme case. Not a book, but a stone, or a rock with engravings in an ancient language no longer under­ stood by anyone alive. Does such a stone not contain human information even if it is not decipherable? Suppose at some point in the future, basic knowledge about linguistics and clever computer aids allow us to decipher it? Or suppose someone discovers the equivalent of a Rosetta stone which allows us to translate it into a known language, and then into English? Can one really say that the stone contained no information prior to translation? It is possible to argue that the stone, prior to deciphering contained only latent information.Table of ContentsPrologue.- The Author’s Dilemma.- 1 Information: Abstraction or Reality?.- Can Information Exist Outside the Human Brain?.- Can Information be Processed Outside the Human Brain?.- Forms of Human Information and its Communication.- Biological Information Systems.- Inorganic Information Systems.- Non-human Information Processing.- Some Epistemological Considerations.- 2 Information Physics: An Introduction.- The Reality of Information.- The Heart of the Concept.- Information: The Hidden Dimension.- 3 Information and Entropy: The Mathematical Relationship.- Information and Organisation.- The Second Law of Thermodynamics.- The Boltzmann/Schrödinger Equation.- Information as an Inverse Exponential Function of Entropy.- The Constant c.- 4 Measuring the Information Changes of Altered Physical States.- Measuring the Information Content of a Crystal.- Proteins as Information Systems.- The Denaturation of Trypsin.- Concluding Remarks.- 5 Information and Entropy: Further Implications.- Information and Entropy as Viewed by the Communications Engineers.- Positive Entropy.- Negative Entropy.- Information Magnitudes.- The Evolution of the Universe.- 6 Some Further Considerations About the Interrelationship Between Information and Energy.- Pure Energy: Heat, the Antithesis of Information.- The Information Content of Energy.- Motion, Distance and Time.- Information and Potential Energy.- The Interconversion of Energy and Information.- Information Machines.- Structural vs Kinetic Information.- Transformations Between Kinetic and Structural Information.- 7 Information and Work.- The Relationship Between Work and Information.- Energy Transducers.- Work in Biological Systems.- Reassessing the Work Equations.- Measuring the Information Content of Electrical Work.- 8 Summary and Concluding Remarks.- The Basic Propositions.- Historical Perspective.- Why Has Information Been Overlooked?.- The Need for Models and Theories.- The Relevance of Information Physics for a General Theory of Information.- Some Concluding Thoughts.- Appendixes.- A. Speculations on Electromagnetic Radiation and Particles of Information.- B. Further Speculations: Implications for Atomic Structure.- C. A Smaller Universe.- D. Other Universes?.

    1 in stock

    £50.99

  • Sequences and Their Applications – SETA 2006: 4th

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Sequences and Their Applications – SETA 2006: 4th

    15 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 4th International Conference on Sequences and Their Applications, SETA 2006. The book presents 32 revised full papers together with 4 invited lectures. The papers are organized in topical sections on linear complexity of sequences, correlation of sequences, stream ciphers and transforms, topics in complexities of sequences, multi-sequence synthesis, sequences and combinatorics, FCSR sequences, aperiodic correlation and applications, and boolean functions, and more.Table of ContentsInvited Papers.- Shift Register Sequences – A Retrospective Account.- The Probabilistic Theory of the Joint Linear Complexity of Multisequences.- Multi-Continued Fraction Algorithms and Their Applications to Sequences.- Codes for Optical CDMA.- Linear Complexity of Sequences.- On the Linear Complexity of Sidel’nikov Sequences over .- Linear Complexity over F p of Ternary Sidel’nikov Sequences.- Bounds on the Linear Complexity and the 1-Error Linear Complexity over F p of M-ary Sidel’nikov Sequences.- The Characterization of 2 n -Periodic Binary Sequences with Fixed 1-Error Linear Complexity.- Correlation of Sequences.- Crosscorrelation Properties of Binary Sequences with Ideal Two-Level Autocorrelation.- Extended Hadamard Equivalence.- Analysis of Designing Interleaved ZCZ Sequence Families.- Stream Ciphers and Transforms.- Security of Jump Controlled Sequence Generators for Stream Ciphers.- Improved Rijndael-Like S-Box and Its Transform Domain Analysis.- Topics in Complexities of Sequences.- Nonlinear Complexity of Binary Sequences and Connections with Lempel-Ziv Compression.- On Lempel-Ziv Complexity of Sequences.- Computing the k-Error N-Adic Complexity of a Sequence of Period p n .- On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences.- Linear/Nonlinear Feedback Shift Register Sequences.- On the Classification of Periodic Binary Sequences into Nonlinear Complexity Classes.- Sequences of Period 2 N –2.- A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences.- Multi-sequence Synthesis.- Implementation of Multi-continued Fraction Algorithm and Application to Multi-sequence Linear Synthesis.- The Hausdorff Dimension of the Set of r-Perfect M-Multisequences.- Filtering Sequences and Pseudorandom Sequence Generators.- Lower Bounds on Sequence Complexity Via Generalised Vandermonde Determinants.- Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm.- On the Discrepancy and Linear Complexity of Some Counter-Dependent Recurrence Sequences.- Sequences and Combinatorics.- Nonexistence of a Kind of Generalized Perfect Binary Array.- FCSR Sequences.- On the Distinctness of Decimations of Generalized l-Sequences.- On FCSR Memory Sequences.- Periodicity and Distribution Properties of Combined FCSR Sequences.- Aperiodic Correlation and Applications.- Generalized Bounds on Partial Aperiodic Correlation of Complex Roots of Unity Sequences.- Chip-Asynchronous Version of Welch Bound: Gaussian Pulse Improves BER Performance.- Boolean Functions.- On Immunity Profile of Boolean Functions.- Reducing the Number of Homogeneous Linear Equations in Finding Annihilators.- The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.- Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions.- Construction of 1-Resilient Boolean Functions with Very Good Nonlinearity.

    15 in stock

    £42.74

  • Digitale Signatur: Grundlagen, Funktion und

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Digitale Signatur: Grundlagen, Funktion und

    15 in stock

    Book SynopsisDigitale Kommunikation dringt in immer mehr Bereiche privater und unternehmerischer Anwendungsfelder ein. Seit 1997 sind die gesetzlichen Rahmenbedingungen in Deutschland für rechtlich gesicherte Vorgänge im Internet geschaffen. Zentraler Bestandteil ist die digitale Signatur. Die Autoren erklären anschaulich und detailliert deren Konzept und Einsatzmöglichkeiten. Die Funktionen von Signatur, Trustcenter, Chipkarte und asymmetrischem Schlüsselverfahren werden dargestellt und durch zahlreiche Diagramme verdeutlicht. Die Informationen dienen als Entscheidungsgrundlage für den Einsatz der digitalen Signatur in Firmen, Institutionen und Behörden. Die Anwendungsbeispiele beziehen sich auf Business-to-Business- und Business-to-Customer-Beziehungen in Intranet und Internet. Das Werk wendet sich vor allem an Produzenten digitaler Medien sowie Entscheider in Wirtschaft und Verwaltung.Table of ContentsAusgangslage.- Konzept.- Zielsetzung.- Das Prinzip der digitalen Signatur.- Rechtliche Aspekte.- Europäische Entwicklung.- Internationale Entwicklungen.- Einsatzfelder.- Business-to-Business-Kommunikation.- Business-to-Customer-Kommunikation.- Intranet (firmeninterne Kommunikation).- Behördliche Kommunikation.- Gesetzesgrundlage.- Glossar.- Literaturverzeichnis.- Index.

    15 in stock

    £42.74

  • Number Theory in Science and Communication: With

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Number Theory in Science and Communication: With

    1 in stock

    Book Synopsis"Number Theory in Science and Communication" is a well-known introduction for non-mathematicians to this fascinating and useful branch of applied mathematics . It stresses intuitive understanding rather than abstract theory and highlights important concepts such as continued fractions, the golden ratio, quadratic residues and Chinese remainders, trapdoor functions, pseudo primes and primitive elements. Their applications to problems in the real world are one of the main themes of the book. This revised fifth edition is augmented by recent advances in coding theory, permutations and derangements and a chapter in quantum cryptography. From reviews of earlier editions – "I continue to find [Schroeder’s] Number Theory a goldmine of valuable information. It is a marvelous book, in touch with the most recent applications of number theory and written with great clarity and humor.’ Philip Morrison (Scientific American) "A light-hearted and readable volume with a wide range of applications to which the author has been a productive contributor – useful mathematics outside the formalities of theorem and proof." Martin GardnerTrade ReviewFrom the reviews of the fifth edition:“Number theory has been a very active field in the last twenty-seven years, and Schroeder’s text has a palimpsest quality, with later mathematical advances layered on earlier ones. … Number Theory in Science and Communication is rewarding to browse, or as a jumping-off point for further research … . It would be a good source of student projects in an undergraduate discrete mathematics or number theory course.” (Ursula Whitcher, The Mathematical Association of America, March, 2011)Table of ContentsA Few Fundamentals.- The Natural Numbers.- Primes.- The Prime Distribution.- Some Simple Applications.- Fractions: Continued, Egyptian and Farey.- Congruences and the Like.- Linear Congruences.- Diophantine Equations.- The Theorems of Fermat Wilson and Euler.- Permutations Cycles and Derangements.- Cryptography and Divisors.- Euler Trap Doors and Public-Key Encryption.- The Divisor Functions.- The Prime Divisor Functions.- Certified Signatures.- Primitive Roots.- Knapsack Encryption.- Residues and Diffraction.- Quadratic Residues.- Chinese and Other Fast Algorithms.- The Chinese Remainder Theorem and Simultaneous Congruences.- Fast Transformation and Kronecker Products.- Quadratic Congruences.- Pseudoprimes, Möbius Transform, and Partitions.- Pseudoprimes Poker and Remote Coin Tossing.- The Möbius Function and the Möbius Transform.- Generating Functions and Partitions.- From Error Correcting Codes to Covering Sets.- Cyclotomy and Polynomials.- Cyclotomic Polynomials.- Linear Systems and Polynomials.- Polynomial Theory.- Galois Fields and More Applications.- Galois Fields.- Spectral Properties of Galois Sequences.- Random Number Generators.- Waveforms and Radiation Patterns.- Number Theory Randomness and “Art”.- Self-Similarity, Fractals and Art.- Self-Similarity, Fractals, Deterministic Chaos and a New State of Matter.

    1 in stock

    £56.99

  • Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers

    1 in stock

    Book SynopsisThis book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009. The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems.Table of ContentsAnalysing the Orbital Movement and Trajectory of LEO (Low Earth Orbit) Satellite Relative to Earth Rotation.- A Cross-Layer PEP for DVB-RCS Networks.- Triple Play over Satellite, Ka-Band Making the Difference.- Time Scheduling Based on Tradeoff between Detection Performance and QoS Requirement.- Study of the Quantum Channel between Earth and Space for Satellite Quantum Communications.- Spectral Analysis of Experimental Ka-Band Propagation Measurements over the Australian LEO Microsatellite ‘FedSat’.- Satellite Broadband Revolution: How Latest Ka-Band Systems Will Change the Rules of the Industry. An Interpretation of the Technological Trajectory.- Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces.- PEPsal Performance Analysis on Disruptive Radio Channels.- PEP Deployment and Bandwidth Management Issues.- High Altitude Platforms: Radio Resource Management Policy for MBMS Applications.- Frequency Tracking Performance Using a Hyperbolic Digital-Phase Locked Loop for Ka-Band Communication in Rain Fading Channels.- Design and Implementation of P2P Streaming Systems for Webcast.- Comparisons on Performances in MIMO Systems under Different Propagation Environments.- Combined Congestion Control and Link Selection Strategies for Delay Tolerant Interplanetary Networks.- Broadband Satellite Multimedia (BSM) Security Architecture and Interworking with Performance Enhancing Proxies.- A Satellite-Based Infrastructure Providing Broadband IP Services on Board High Speed Trains.

    1 in stock

    £40.49

  • Progress in Cryptology - INDOCRYPT 2010: 11th

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Progress in Cryptology - INDOCRYPT 2010: 11th

    Out of stock

    Book SynopsisStrong Pseudorandompermutations or SPRPs,which were introduced byLuby andRacko? [4], formalize the well established cryptographic notion ofblock ciphers.They provided a construction of SPRP, well known as LRconstruction, which was motivated by the structure of DES[6].The basicbuildingblock is the so called 2n-bit Feistel permutation (or LR round permutation) LR based F K on an n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x ,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig 1) offour rounds of Feistel permutations (or three rounds, for PRP), each round involves an application ofanindependent PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K ,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K ,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many results are known improvingperformance (reducingthe number of invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by usinga PRF[2]). However there are some limitations.Forexample,wecannotuseas few as single-keyLR (unless wetweak the roundpermutation) orasfew as two-roundsince they are not secure. Distinguishing attacks forsome other LR constructionsarealso known [8]. We list some oftheknow related results (see Table 1). Here all keys K ,K ,...are independently chosen.Table of ContentsInvited Talk.- Getting a Few Things Right and Many Things Wrong.- Security of RSA and Multivariate Schemes.- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions.- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks.- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key.- Security Analysis, Pseudorandom Permutations and Applications.- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations.- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants.- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.- Invited Talk.- Cryptographic Hash Functions: Theory and Practice.- Hash Functions.- Cryptanalysis of Tav-128 Hash Function.- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing.- Speeding Up the Wide-Pipe: Secure and Fast Hashing.- Attacks on Block Ciphers and Stream Ciphers.- New Boomerang Attacks on ARIA.- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA.- Greedy Distinguishers and Nonrandomness Detectors.- Fast Cryptographic Computation.- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity.- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication.- Cryptanalysis of AES.- Attack on a Higher-Order Masking of the AES Based on Homographic Functions.- Improved Impossible Differential Cryptanalysis of 7-Round AES-128.- Cryptanalysis of a Perturbated White-Box AES Implementation.- Efficient Implementation.- A Program Generator for Intel AES-NI Instructions.- ECC2K-130 on NVIDIA GPUs.- One Byte per Clock: A Novel RC4 Hardware.

    Out of stock

    £44.99

  • Datenschutz: Einführung in technischen

    Springer Fachmedien Wiesbaden Datenschutz: Einführung in technischen

    1 in stock

    Book SynopsisDieses Lehrbuch behandelt im ersten Teil schwerpunktmäßig technische Maßnahmen, die den Schutz personenbezogener Daten sicherstellen. Dazu werden grundlegende Verfahren der Anonymisierung und der Gewährleistung von Anonymität im Internet (z. B. Tor) vorgestellt. Das Buch gibt einen Überblick über gängige Verfahren des Identitätsmanagements (z. B. OpenID Connect) und die in elektronischen Ausweisdokumenten (z. B. im Personalausweis) verwendeten Sicherheitsmaßnahmen. Die Datenschutz-Garantien der vermittelten Ansätze werden im Detail behandelt. Im Bereich des World Wide Web erfährt der Leser, wo die Probleme aus Sicht des Datenschutzes liegen und wie diese Lücken geschlossen werden können. Anonyme Bezahlverfahren und eine Untersuchung von Bitcoin runden den technischen Teil des Buches ab. Der Leser lernt Ansätze aus der Praxis kennen, um so je nach Anforderungen in der Systementwicklung das passende Verfahren auswählen zu können.Im zweiten Teil werden die Grundlagen des Datenschutzrechts behandelt. Denn technische Maßnahmen sollen unerlaubte Datenverarbeitung verhindern; das Recht bestimmt, welche Datenverarbeitungen erlaubt sind. Ohne Kenntnisse im Datenschutzrecht können technische Maßnahmen nicht richtig implementiert werden. Zum besseren Verständnis erfolgt ein Überblick über die Rechtsordnung insgesamt, in die das Datenschutzrecht eingeordnet wird. Betrachtet werden die europäische und die verfassungsrechtliche Dimension des Datenschutzes. Der Schwerpunkt liegt auf den Regelungen der Datenschutz-Grundverordnung. Dabei werden auch besonders häufig vorkommende und Fragen aufwerfende Verarbeitungssituationen wie das Webtracking erörtert. Beispielhaft werden datenschutzrechtliche Fälle bearbeitet.Trade Review“... Im rechtlichen Teil ist hervorzuheben, dass ... Grundlagen des Rechtsverständnisses zielgruppenbezogen für Informatikerinnen und Informatiker dargestellt werden. ... Es bildet die technischen Themen umfassend ab und bietet für das rechtliche Verständnis aktueller Fragestellungen eine solide Grundlage.” (Rudi Kramer, in: AWV-Informationen, 14. Februar 2023) Table of ContentsEinführung in den Technischen Datenschutz - Anonymitätsmaße - Anonymität im Internet - Identitätsmanagement - Anonymes Bezahlen und Bitcoin - Datenschutz im World Wide Web - Instant Messaging - Elektronische Ausweisdokumente - Weitere Privacy-Enhancing Technologies - Datenschutzrecht - Einführung in die Rechtsordnung - Wichtige Gesetze, wichtige Grundbegriffe - Erlaubte und unerlaubte Datenverarbeitungen, Rechtsgrundlagen - Rechenschaftspflicht - technische und organisatorische Maßnahmen (toM) - Betroffenenrechte (Auskunft, Kopie, Berichtigung, Löschung usw.) - Wichtige Verarbeitungssituationen (Videoüberwachung, Fotoaufnahmen, Tracking, Cloud Computing usw.) - Zertifizierung, Akkreditierung - Betriebliche Datenschutzbeauftragte - Datenschutz-Aufsichtsbehörde

    1 in stock

    £26.59

  • Codebasierte PostQuantenKryptografie

    Springer Vieweg Codebasierte PostQuantenKryptografie

    1 in stock

    Book SynopsisEinleitung.- Quantencomputer und moderne Kryptografie.- Goppa Codes.- Das McEliece-Kryptosystem und seine Varianten.- Zusammenfassung und Ausblick.

    1 in stock

    £49.49

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account