Data encryption Books
Springer Verlag, Singapore Quantum Algorithms for Cryptographically
Book SynopsisThis book is a timely report of the state-of-the-art analytical techniques in the domain of quantum algorithms related to Boolean functions. It bridges the gap between recent developments in the area and the hands-on analysis of the spectral properties of Boolean functions from a cryptologic viewpoint. Topics covered in the book include Qubit, Deutsch–Jozsa and Walsh spectrum, Grover’s algorithm, Simon’s algorithm and autocorrelation spectrum. The book aims at encouraging readers to design and implement practical algorithms related to Boolean functions. Apart from combinatorial techniques, this book considers implementing related programs in a quantum computer. Researchers, practitioners and educators will find this book valuable. Table of Contents1. Introduction.- 2. Deutsch-Jozsa and Walsh Spectrum.- 3. Grover’s Algorithm and Walsh Spectrum.- 4. Simon’s Algorithm and Autocorrelation Spectrum.- 5. Conclusion & Research Direction.
£52.24
Springer Verlag, Singapore Blockchain Technology: From Theory to Practice
Book SynopsisBlockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.Table of ContentsIntroduction to Blockchain Technology.- Blockchain Revolution from 1.0 to 5.0: Technological Perspective.- Decentralization and Architecture of Blockchain Technology.- Basics of Cryptographic Primitives for Blockchain Development.- Smart Contracts for Building Decentralized Applications.- Distributed Consensus for Permissionless Environment.- Mining Procedure in Distributed Consensus.- Distributed Consensus for Permissioned Environment.- Consensus Scalability in Blockchain Network.- Building Trust in Blockchain Network using Collective Signing.- Adoption of Blockchain in Enterprise Computing.- Blockchain for Supply Chain Management.- Blockchain for Government Services.- Impact of Blockchain on Academic Publishing.
£85.49
Springer Verlag, Singapore Blockchain Technology: From Theory to Practice
Book SynopsisBlockchain is an emerging technology platform for developing decentralized applications and data storage, over and beyond its role as the technology underlying the cryptocurrencies. The basic tenet of this platform is that it allows one to create a distributed and replicated ledger of events, transactions, and data generated through various IT processes with strong cryptographic guarantees of tamper resistance, immutability, and verifiability. Public blockchain platforms allow us to guarantee these properties with overwhelming probabilities even when untrusted users are participants of distributed applications with the ability to transact on the platform. Even though, blockchain technology has become popularly known because of its use in the implementation of cryptocurrencies such as BitCoin, Ethereum, etc.; the technology itself holds much more promise in various areas such as time stamping, logging of critical events in a system, recording of transactions, trustworthy e-governance, etc. It introduces theoretical and practical aspects of blockchain technology. The book includes an in-depth insight into the need for decentralization, smart contracts, consensus both permissioned and permissionless, and various blockchain development frameworks, tools, and platforms. It can be used as a learning resource for various examinations and certifications related to cryptocurrency and blockchain technology. This book explained the nuts and bolts of blockchain technology in lucid language to make students more familiar with the implementation perspective of this much-needed technology.Table of ContentsIntroduction to Blockchain Technology.- Blockchain Revolution from 1.0 to 5.0: Technological Perspective.- Decentralization and Architecture of Blockchain Technology.- Basics of Cryptographic Primitives for Blockchain Development.- Smart Contracts for Building Decentralized Applications.- Distributed Consensus for Permissionless Environment.- Mining Procedure in Distributed Consensus.- Distributed Consensus for Permissioned Environment.- Consensus Scalability in Blockchain Network.- Building Trust in Blockchain Network using Collective Signing.- Adoption of Blockchain in Enterprise Computing.- Blockchain for Supply Chain Management.- Blockchain for Government Services.- Impact of Blockchain on Academic Publishing.
£56.99
Springer Verlag, Singapore Industry 4.0: Technologies, Applications, and
Book SynopsisThis book presents Industry 4.0 enabler technologies and tools. It also highlights some of the existing empirical applications in the context of manufacturing. The book elucidates innovative thematic concepts of Industry 4.0 and its perspectives. It establishes routes to empirically utilize Industry 4.0 standards for manufacturing companies. The book can be used as a reference for professionals/engineers, researchers, and students.Table of ContentsIndustry 4.0 concepts, technologies and its ecosystemCyber-physical system: enabler technologies, concepts and its role in industry 4.0 The Internet of Things: success stores and challenges in manufacturing Blockchain technology and its role in industry 4.0Blockchain technology applications and challenges in Industry 4.0 Industry 4.0 technologies in product design: Virtual design and Manufacturing, Augmented reality Digital Twins and its applications Big data analytics in industry 4.0Industry 4.0 in pharmaceutical industry: Towards pharma 4.0 Industry 4.0 in military: Towards military 4.0 Towards Industry 5.0: what Cognitive cyber physical system is?
£94.99
Springer Verlag, Singapore Design and Cryptanalysis of ZUC: A Stream Cipher
Book SynopsisThis book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.Table of Contents1. Introduction and Preliminaries.- 2. Introduction and Preliminaries.- 3. Introduction and Preliminaries.- 4. Introduction and Preliminaries.- 5. Introduction and Preliminaries.- 6. Test Vectors for ZUC.
£40.49
Springer Nature Singapore Information Security and Cryptology
Book Synopsis
£67.99
Springer Nature Singapore Information Security and Cryptology
Book Synopsis
£56.99
Springer Verlag, Singapore Cryptology and Network Security: 22nd
Book SynopsisThis book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.Table of ContentsSchemes I.- Forward Security under Leakage Resilience, Revisited.- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE.- Signatures with Delegation.- Basic Primitives.- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.- Hardness of Learning AES with Gradient-based Methods.- Security.- Privacy-Preserving Digital Vaccine Passport .- Exploiting Android Browser.- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners.- MPC with Cards.- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols.- Free-XOR in Card-based Garbled Circuits.- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.- Key Filtering in Cube Attacks from the Implementation Aspect.- New Techniques for Modeling SBoxes: An MILP Approach.- Blockchain.- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.
£66.49
Apress AI Applications Enabled by Blockchain
Book SynopsisIntroduction.- 1. AI Enabled Blockchain.- 2.Behold the Dreamers.- 3.The Gold Rush: Mining Bitcoin.- 4.Foundations of a blockchain beyond Bitcoin.- 5. Unpacking Ethereum.- 6.Decentralized organizations.- 7. The DAO Hacked.- 8.High-Performance Decentralized Computing.- 9.Blockchain in Funding for Science.- 10.Large Language Multimodesl and Autonomous Agents.- 11.Generative AI in Healthcare.- 12.Technological Revolutions and Financial Capital.- 13.Blockchain-based Consortia as a Service.- 14.Blockchain-based Standards for Healthcare and AI.- 15.Blockchain in Government and Enterprise.- 16.Beyond AI and Blockchain: A roundtable conversation.
£43.99