Зарегистрироваться
Восстановить пароль
FAQ по входу

Криптология и криптография

Требуется помощь в преобразовании раздела Информатика и вычислительная техника

Если Вы компетентны в тематике этого раздела, то Вас, возможно, заинтересует обсуждение планируемых преобразований.

Доверенные пользователи и модераторы раздела

Springer, 2018. — 220 p. This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book...
  • №1
  • 5,63 МБ
  • добавлен
  • изменен
Springer, 2016. — 367 p. Classical information processing consists of the main tasks of gaining knowledge,storage, transmission, and hiding data. The first named task is the prime goal of statistics and for the next two Shannon presented an impressive mathematical theory, called information theory, which he based on probabilistic models. Basic in this theory are concepts of...
  • №2
  • 2,76 МБ
  • добавлен
  • изменен
Доклад. Technical Report Series: DCC-2011- 11. Departamento de Ciencia de Computadores. Finite automata public-key cryptosystems rely upon characterizations of some types of invertible finite automata, and methods of obtain them as well as their respective inverses. In this paper we provide a much needed clarification of Tao’s formalization and basic results on the subject, as...
  • №3
  • 170,51 КБ
  • добавлен
  • изменен
Автор неизвестен. Network Associates, 1999. — 88 p. Cryptography is the stuff of spy novels and action comics. Kids once saved up OvaltineTM labels and sent away for Captain Midnight’s Secret Decoder Ring. Almost everyone has seen a television show ormovie involving a nondescript suit-clad gentleman with a briefcase handcuffed to his wrist. The word “espionage” conjures images...
  • №4
  • 1,05 МБ
  • добавлен
  • изменен
Автор неизвестен. PGP Corporation, 2003. — 74 p. Cryptography is the stuff of spy novels and action comics. Kids once saved up Ovaltine ™ labels and sent away for Captain Midnight’s Secret Decoder Ring. Almost everyone has seen a television show or movie involving a nondescript suit-clad gentleman with a briefcase handcuffed to his wrist. The term “espionage” conjures images of...
  • №5
  • 1,14 МБ
  • добавлен
  • изменен
Издательство Artech House, 2003, -319 pp. Few research subjects in computer science are as inextricably linked with problems from other disciplines, ranging from economic theory to intellectual property law and even politics, as the study of protection mechanisms for intellectual property. The present book therefore not only introduces a number of techniques for such...
  • №6
  • 2,81 МБ
  • добавлен
  • изменен
No Starch Press, 2018. — 312 p. — ISBN 978-1-59327-826-7. This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and...
  • №7
  • 19,77 МБ
  • добавлен
  • изменен
No Starch Press, 2018. — 312 p. — ISBN 978-1-59327-826-7. Целевая аудитория: опытные разработчики. Данное практическое руководство познакомит вас с современными и актуальными методами шифрования информации. Являясь хорошим пособием по математическим концепциям и алгоритмам шифрования, руководство также касается таких приёмов и методов как хэш-функции, блочное шифрование,...
  • №8
  • 4,06 МБ
  • добавлен
  • изменен
No Starch Press, 2017. — 312 p. This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.
  • №9
  • 19,84 МБ
  • добавлен
  • изменен
No Starch Press, 2017. — 312 p. This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.
  • №10
  • 5,02 МБ
  • добавлен
  • изменен
CRC Press, 2014. — 365 p. — ISBN-10: 1482228890, ISBN-13: 978-1-4822-2890-8. На англ. языке. Cryptography, the science of encoding and decoding information, allows people to do online banking, online trading, and make online purchases, without worrying that their personal information is being compromised. The dramatic increase of information transmitted electronically has led...
  • №11
  • 2,68 МБ
  • добавлен
  • изменен
Springer, 2005. — 262 p. — ISBN 13 978-0-387-27934-3. This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to...
  • №12
  • 1,35 МБ
  • добавлен
  • изменен
Springer, 2005. — 254 p. — ISBN 13 978-0-387-27934-3. This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to...
  • №13
  • 15,77 МБ
  • дата добавления неизвестна
  • изменен
Springer, 2009. — 530 p. In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and coding theory. Both cryptography and codes have crucial...
  • №14
  • 3,46 МБ
  • добавлен
  • изменен
Springer, 2009. - 368 p. ISBN: 0387887563 Algebraic Cryptanalysis bridges the gap between a course in cryptography, and being able to read the cryptanalytic literature. This book is divided into three parts: Part One covers the process of turning a cipher into a system of equations; Part Two covers finite field linear algebra; Part Three covers the solution of Polynomial...
  • №15
  • 2,04 МБ
  • добавлен
  • изменен
Издательство John Wiley/IEEE Press, 2013, -210 pp. There are now many texts available giving an overview of both public key and symmetric key cryptography. The focus of this text is only the former. The objective is to give a complete description of the current major public key cryptosystems, the underlying mathematics, and the most common techniques used in attacking them. It...
  • №16
  • 1,22 МБ
  • добавлен
  • изменен
Princeton: Princeton University Press, 2017. — 637 p. "In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was...
  • №17
  • 39,99 МБ
  • добавлен
  • изменен
Springer, 2007. — 555 p. In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the...
  • №18
  • 8,71 МБ
  • добавлен
  • изменен
Springer, 2007. — 555 p. In today's extensively wired world, cryptology is vital for guarding communication channels, databases, and software from intruders. Increased processing and communications speed, rapidly broadening access and multiplying storage capacity tend to make systems less secure over time, and security becomes a race against the relentless creativity of the...
  • №19
  • 11,05 МБ
  • добавлен
  • изменен
De Gruyter (May 27, 2015). — 376 р. — (De Gruyter Graduate) Focuses on the mathematics of cryptographic protocols Discusses relevant ideas from computer science and complexity theory Includes chapter on noncommutative algebraic cryptography Aims and Scope Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive...
  • №20
  • 4,46 МБ
  • добавлен
  • изменен
Springer Nature Switzerland AG, 2018. — XVII+720 p. — (Lecture Notes in Computer Science, 11239). — ISBN 978-3-030-03807-6. The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the...
  • №21
  • 5,00 МБ
  • добавлен
  • изменен
Springer Nature Switzerland AG, 2018. — XVII+732 p. — (Lecture Notes in Computer Science, 11240). — ISBN 978-3-030-03810-6. The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018. The total of 50 revised full papers presented in the...
  • №22
  • 8,55 МБ
  • добавлен
  • изменен
AK Peters, 2006. — 144 p. — ISBN-13: 978-1568812236. Join the Cryptokids as they apply basic mathematics to make and break secret codes. This book has many hands-on activities that have been tested in both classrooms and informal settings. Classic coding methods are discussed, such as Caesar, substitution, Vigenère, and multiplicative ciphers as well as the modern RSA. Math...
  • №23
  • 1,35 МБ
  • добавлен
  • изменен
Springer-Verlag, Berlin, Heidelberg, 2008. — 247 p. — ISBN 3540887016. Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and...
  • №24
  • 2,21 МБ
  • добавлен
  • изменен
New York: Springer, 2008. — 248 p. — ISBN: 978-3-540-88701-0. Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and...
  • №25
  • 2,30 МБ
  • добавлен
  • изменен
IOS Press, 2015. — 387 p. This book had its origins in the NATO Advanced Study Institute (ASI) held in Ohrid, Macedonia, in 2014. The focus of this ASI was the arithmetic of superelliptic curves and their application in different scientific areas, including whether all the applications of hyperelliptic curves, such as cryptography, mathematical physics, quantum computation and...
  • №26
  • 3,71 МБ
  • добавлен
  • изменен
Springer, 2009. — 279 p. — ISBN: 978-1-84800-272-2. Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle it, for example, mobile phones, digital cameras, and personal computers. This book is an integrated introduction to the mathematics of coding, that is, replacing information expressed in symbols, such...
  • №27
  • 3,40 МБ
  • добавлен
  • изменен
Jones and Bartlett Publishers, 2003. — 387 p. — ISBN: 0-7637-2207-3. (+материалы с сайта поддержки - source code and e.t.c.) Introduction to Cryptography with Java Applets covers the mathematical basis of cryptography and cryptanalysis, like linear diophantine equations, linear congruences, systems of linear congruences, quadratic congruences, and exponential congruences....
  • №28
  • 6,29 МБ
  • добавлен
  • изменен
Cambridge University Press, 2014. — 608 p. Information transmission and information protection are two sides of the same tapestry, But with the information-protection side having more tangled and multitextured threads. At the core of the subject of information protection is the more specific subject of classical cryptography, which protects the content of a message from being...
  • №29
  • 3,40 МБ
  • добавлен
  • изменен
Springer, 1994. — 473. Information theory is an exceptional field in many ways. Technically, it is one of the rare fields in which mathematical results and insights have led directly to significant engineering payoffs. Professionally, it is a field that has sustained a remarkable degree of community, collegiality and high standards. James L. Massey, whose work in the field is...
  • №30
  • 6,93 МБ
  • добавлен
  • изменен
Cambridge University Press, 1999. — 224 p. — ISBN: 0521653746, 9780521653749 In the past few years elliptic curve cryptography has moved from a fringe activity to a major challenger to the dominant RSA/DSA systems. Elliptic curves offer major advances on older systems such as increased speed, less memory and smaller key sizes. As digital signatures become more and more...
  • №31
  • 8,94 МБ
  • добавлен
  • изменен
Cambridge University Press, 2005. — 299 p. — ISBN-13: 978-0-521-60415-4. Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways...
  • №32
  • 4,66 МБ
  • добавлен
  • изменен
Springer, 2010. — 302 p. — ISBN-13: 978-3-642-14312-0. Information Security and Cryptography. Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover...
  • №33
  • 2,60 МБ
  • добавлен
  • изменен
Berlin: Springer-Verlag, 2000. — 326 p. — ISBN-13: 978-3540667780. "The editors however have done an excellent job of stitching together a rewarding tapestry of the field as it stands today...The Physics of Quantum Information is essential reading for anyone new to the field, particularly if they enter from the direction of quantum optics and atomic physics." -The Physicist...
  • №34
  • 4,07 МБ
  • добавлен
  • изменен
MIT Press, 2000. — 356 pp. — ISBN: 978-0262024914. As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts believe that digital certificates offer the best technology for safeguarding electronic communications. They are...
  • №35
  • 1,49 МБ
  • добавлен
  • изменен
2nd edition. — Springer, 2004. — 351 p. — ISBN 978-0-387-20756-8; ISBN 978-1-4419-9003-7. This book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter. Cryptography is a key...
  • №36
  • 10,27 МБ
  • добавлен
  • изменен
Springer, 2000. — 296 p. — ISBN-10: 0387950346. Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. Based on courses taught at Technical University in...
  • №37
  • 28,36 МБ
  • добавлен
  • изменен
PE Press, 2016. — 256 р. This book is an introductory crash course to Cryptography and Cryptanalysis. It is presented using a ground-up approach to learning so that readers of all knowledge levels can understand the content. It provides a brief history of Cryptography, and attempts to explain what Cryptography is and why it is so important to everyone today. In this second...
  • №38
  • 3,93 МБ
  • добавлен
  • изменен
PE Press, 2016. — 256 р. This book is an introductory crash course to Cryptography and Cryptanalysis. It is presented using a ground-up approach to learning so that readers of all knowledge levels can understand the content. It provides a brief history of Cryptography, and attempts to explain what Cryptography is and why it is so important to everyone today. In this second...
  • №39
  • 16,25 МБ
  • добавлен
  • изменен
Osborne: McGraw-Hill Osborne Media, 2001. — 449 p. — ISBN-13: 978-0072131390. Welcome to the second book from RSA Press, RSA Security’s Official Guide to Cryptography! As the Internet becomes a more pervasive part of daily life, the need for e-security becomes even more critical. Any organization engaged in online activity must assess and manage the e-security risks associated...
  • №40
  • 8,09 МБ
  • добавлен
  • изменен
CRC Press. Boca Raton, FL, USA. 2012. 400 pages. Includes references and index. ISBN-10: 1466501383 Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side...
  • №41
  • 3,60 МБ
  • добавлен
  • изменен
Издательство Cambridge University Press, 2010, -144 pp. A fundamental objective of cryptography is to enable two people to communicate over an insecure channel (a public channel such as internet) in such a way that any other person is unable to recover their message (called the plaintext) from what is sent in its place over the channel (the ciphertext). The transformation of...
  • №42
  • 838,01 КБ
  • добавлен
  • изменен
Springer, 2016. — 203 p. — (Springer Proceedings in Mathematics & Statistics 161). — ISBN 331932084X. This volume collects contributions written by different experts in honor of Prof. Jaime Muñoz Masqué. It covers a wide variety of research topics, from differential geometry to algebra, but particularly focuses on the geometric formulation of variational calculus; geometric...
  • №43
  • 2,66 МБ
  • добавлен
  • изменен
Springer, 2019. — 351 p. — (Springer Undergraduate Texts in Mathematics and Technology) - ISBN 3030154513. This text presents a careful introduction to methods of cryptology and error correction in wide use throughout the world and the concepts of abstract algebra and number theory that are essential for understanding these methods. The objective is to provide a thorough...
  • №44
  • 4,39 МБ
  • добавлен
  • изменен
New York: Springer, 2009. — 229 p. — ISBN-13: 978-0-387-87 968-0. Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security. Secure Key Establishment identifies several variants of the key...
  • №45
  • 1,84 МБ
  • добавлен
  • изменен
CRC Press, 2012. — 532 p. With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography and Secret Image Sharing is a complete introduction to novel security methods and...
  • №46
  • 8,84 МБ
  • добавлен
  • изменен
Chapman & Hall/CRC Press, 2006. — 843 p. The goal of this book is to explain in great detail the theory and algorithms involved in elliptic and hyperelliptic curve cryptography. The reader is strongly advised to read carefully what follows before reading the rest of the book, otherwise she may be discouraged by some parts. The intended audience is broad: our book is targeted...
  • №47
  • 5,47 МБ
  • добавлен
  • изменен
John Wiley & Sons, 2005. — 697 p. — ISBN: 0-7645-7397-7. A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of security Written by three high-profile experts, including Eric Cole, an ex-CIA security guru who appears regularly on CNN and elsewhere in the media, and Ronald Krutz, a security...
  • №48
  • 12,54 МБ
  • добавлен
  • изменен
John Wiley & Sons, 2003. — 361 p. — ISBN-13: 978-0471444497. Explains exactly what steganography is-hiding a message inside an innocuous picture or music file-and how it has become a popular tool for secretly sending and receiving messages for both the good guys and the bad guys * First book to describe international terrorists' cybersecurity tool of choice in an accessible...
  • №49
  • 7,68 МБ
  • добавлен
  • изменен
Springer International Publishing AG, 2016. — 308 p. — (Lecture Notes in Mathematics 2178). — ISBN 3319504479. Filling a gap in the literature, this book takes the reader to the frontiers of equivariant topology, the study of objects with specified symmetries. The discussion is motivated by reference to a list of instructive “toy” examples and calculations in what is a relatively...
  • №50
  • 9,11 МБ
  • добавлен
  • изменен
CRC Press, 1999. — 198 p. — ISBN-13 978-1568810829. This book is an introduction to the algorithmic aspects of number theory and its applications to cryptography, with special emphasis on the RSA cryptosys-tem. It covers many of the familiar topics of elementary number theory, all with an algorithmic twist. The text also includes many interesting historical notes.
  • №51
  • 23,04 МБ
  • добавлен
  • изменен
Morgan Kaufmann, 2008. — 623. It has been almost 7 years since the publication of Digital Watermarking. During this period there has been significant progress in digital watermarking; and the field of steganography has witnessed increasing interest since the terrorist events of September 11, 2001. Digital watermarking and steganography are closely related. In the first edition...
  • №52
  • 4,02 МБ
  • добавлен
  • изменен
American Mathematical Society, 2013. — 354 p. — ISBN-13 978-0-8218-8321-1. Modern cryptography lies at the intersection of mathematics and computer sciences, involving number theory, algebra, computational complexity, fast algorithms, and even quantum mechanics. Many people think of codes in terms of spies, but in the information age, highly mathematical codes are used every...
  • №53
  • 3,92 МБ
  • добавлен
  • изменен
Sebastopol: O'Reilly & Associates, 1999. — 59 p. — ISBN: 1-56592-520-3. Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design is a book that, for the first time, reveals full technical details on how researchers and data-recovery engineers can build a working DES Cracker. It includes design specifications and board schematics, as well as full source code for...
  • №54
  • 660,61 КБ
  • добавлен
  • изменен
Rosen Education Service, 2013. — 98 p. —(Intelligence and Counterintelligence). — ISBN: 1622750349, 9781622750344 Beginning with definitions of such basic terms as cryptanalysis, encryption, and decryption, this introduction from the Intelligence and Counterintelligence series emphasizes the point that cryptography is now a part of everyday business, not limited to espionage...
  • №55
  • 12,63 МБ
  • добавлен
  • изменен
New York: Springer, 2005. — 283 p. — ISBN 0-387-20109-2. DES, the workhorse of cryptography and the U.S. government encryption standard for just shy of twenty years (from 1978 to 1997), was used to protect a vast array of sensitive information in the United Stated and throughout the rest of the world. Many cryptographers felt that DES, which was a 56-bit standard, was too...
  • №56
  • 2,13 МБ
  • добавлен
  • изменен
New York: Springer, 2002. — 255 p. An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying...
  • №57
  • 3,67 МБ
  • добавлен
  • изменен
National Academies Press, 1996. — 619 p. — ISBN-13: 978-0309054751. Every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. Rival companies can glean proprietary secrets. Anti-U.S. terrorists can plot attacks. Network hackers can do anything from...
  • №58
  • 1,42 МБ
  • добавлен
  • изменен
Heidelberg, Springer-Verlag, 2012. - 342p. Сборник трудов XV международной конференции по финансовой криптографии (Грос-Айлет, Сент-Люсия, 28 февраля - 4 марта 2011), посвящённый различным аспектам защиты информации (математическим, организационным, психологическим и т.п.) Для специалистов в области защиты информации.
  • №59
  • 5,64 МБ
  • добавлен
  • изменен
MANY PEOPLE have urged me to put out a paperback edition of The Codebreakers. Here it is. It comprises about a third of the original. This was as big as the publishers and I could make it and still keep the price within reason. In cutting the book, I retained mainly stories about how codebreaking has affected history, particularly in World War II, and major names and stages in the...
  • №60
  • 1,44 МБ
  • добавлен
  • изменен
Wiley, 2011. — 696 p. — ISBN 978-0-470-92041-1. Hands-on, practical guide to implementing SSL and TLS protocols for Internet security. If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...
  • №61
  • 4,51 МБ
  • добавлен
  • изменен
Wiley, 2011. — 696 p. — ISBN 978-0-470-92041-1. Целевая аудитория: опытные разработчики. Если вы занимаетесь сетевой безопасностью, то наверняка уже знакомы с различными известными криптографическими протоколами, среди которых есть SSL и TLS. Если ещё нет, данное практические пособие познакомит не только с основами их работы, но и с примерами подключения и реализации. В книге...
  • №62
  • 6,13 МБ
  • добавлен
  • изменен
Network Associates, Inc., 2002, 80 pp. Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.In the first part, this book covers the key concepts of cryptography on an...
  • №63
  • 666,80 КБ
  • добавлен
  • изменен
Springer, 2007. - 368 pages. Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data. In the first part, this book covers the key concepts of cryptography on an...
  • №64
  • 2,63 МБ
  • добавлен
  • изменен
Syngress, 2006. - 320 pages. Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader regarding how to implement efficient multiple precision algorithms.
  • №65
  • 1,33 МБ
  • дата добавления неизвестна
  • изменен
Springer, 2010. — 294 p. — ISBN 978-3-540-89409-4. In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...
  • №66
  • 2,42 МБ
  • добавлен
  • изменен
Boston: Artech House, 2004. — 399 p. — ISBN: 1-58053-530-5. With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for computer/network security practitioners, systems designers, applications developers, and researchers. This timely book delivers the hands-on knowledge...
  • №67
  • 14,18 МБ
  • добавлен
  • изменен
Press, 2012. — 298 p. Steganography is the science and art of covert communications and involves two procedures. First, the required message is concealed in a particular carrier, e.g., image, audio, text, etc., that is called a steganographic cover. The second procedure is concerned with transmitting the cover to the message recipient without drawing suspicion. Fundamentally, the...
  • №68
  • 3,82 МБ
  • добавлен
  • изменен
CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. — Springer, 2018. — 287 p. — ISBN 978-3319941462. This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully...
  • №69
  • 15,54 МБ
  • добавлен
  • изменен
Warstein, Duitsland, 2000, 88 pp. Both coding theory and cryptography have been already proven to be essential in our information age. While they may seem to achieve opposite goals at rst sight, they share much more than that. This thesis aims to reveal at least part of that relation: how coding theory can be applied in cryptography.
  • №70
  • 612,26 КБ
  • добавлен
  • изменен
New Jersey: John Wiley & Sons, 2008. — 254 p. — ISBN 978-0-470-1 9339-6. Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and...
  • №71
  • 14,70 МБ
  • добавлен
  • изменен
McGraw-Hill, 2016. — 416 p. — ISBN: 9781259588099 This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels-with no math expertise required Cryptography underpins today's cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to...
  • №72
  • 14,06 МБ
  • добавлен
  • изменен
Springer, 1999. — 175 p. — ISBN-13: 978-0792385899. Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of the art for such...
  • №73
  • 1,92 МБ
  • добавлен
  • изменен
Kluwer Academic Publishers, 1999. — 175 p. — ISBN-13: 978-0792385899. Since their invention in the late seventies, public key cryptosystems have become an indispensable asset in establishing private and secure electronic communication, and this need, given the tremendous growth of the Internet, is likely to continue growing. Elliptic curve cryptosystems represent the state of...
  • №74
  • 976,36 КБ
  • добавлен
  • изменен
London: Royal Holloway University, 1998. — 27 p. Department of Mathematics. This report gives a basic introduction to block cipher design and analysis. The concepts and design principles of block ciphers are explained, particularly the class of block ciphers known as Feistel ciphers. Some modern block cipher cryptanalysis methods are demonstrated by applying them to...
  • №75
  • 241,10 КБ
  • добавлен
  • изменен
Basel: Birkhauser Basel, 2004. — 405 p. — ISBN 978-3-0348-9602-3. On the Secondary Constructions of Resilient and Bent Functions Adaptive Recursive MLD Algorithm Based on Parallel Concatenation Decomposition for Binary Linear Codes Modularity of Asymptotically Optimal Towers of Function Fields A New Correlation Attack on LFSR Sequences with High Error Tolerance LDPC Codes: An...
  • №76
  • 35,24 МБ
  • добавлен
  • изменен
Wiley Publishing, 2010. — 384 p. — ISBN: 0470474246. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management....
  • №77
  • 5,11 МБ
  • добавлен
  • изменен
The selective application of technological and related procedural safeguards is an important responsibility of every Federal organization in providing adequate security in its computer and telecommunication systems. This publication provides a standard that will be used by Federal organizations when these organizations specify that cryptographic-based security systems are to be...
  • №78
  • 1,40 МБ
  • дата добавления неизвестна
  • изменен
New York: Dover Publications, 1989. — 263 p. — ISBN-13: 978-0486200972. Thorough, systematic introduction to serious cryptography, especially strong in modern forms of cipher solution used by experts. Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more.
  • №79
  • 12,06 МБ
  • добавлен
  • изменен
Ver. 2 — Auckland (N.Z.): The University of Auckland, 2018. — 695 p. Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and...
  • №80
  • 5,14 МБ
  • добавлен
  • изменен
Wiley, 2002. — 419 p. — ISBN: 0-471-21029-3. Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the...
  • №81
  • 1,36 МБ
  • добавлен
  • изменен
Springer, 2007. — 210 p. The theory of algebraic function fields over finite fields has its origins in number theory. However, after Goppa`s discovery of algebraic geometry codes around 1980, many applications of function fields were found in different areas of mathematics and information theory, such as coding theory, sphere packings and lattices, sequence design, and...
  • №82
  • 3,24 МБ
  • добавлен
  • изменен
New York: Prometheus Books, 2015. — 295 p. — ISBN-10 163388144X. Bitcoin, the digital currency, was introduced in 2009 with little fanfare; five years later, shocking the world, it was worth $14 billion. This book explores the cyber currency by focusing on the remarkable stories and intriguing personalities of those responsible for its sudden success: Satoshi Nakamoto, the...
  • №83
  • 2,49 МБ
  • добавлен
  • изменен
ArXiv, 2001. — 57 p. Group of Applied Physics, University of Geneva, 1211 Geneva 4, Switzerland. Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.
  • №84
  • 1,37 МБ
  • добавлен
  • изменен
Издательство Cambridge University Press, 2009, -449 pp. Volume 2 of /file/493751 Cryptography is concerned with the construction of schemes that withstand any abuse. Such schemes are constructed so as to maintain a desired functionality, even under malicious attempts aimed at making them deviate from their prescribed functionality. The design of cryptographic schemes is a very...
  • №85
  • 1,88 МБ
  • добавлен
  • изменен
Cambridge University Press, 2004. — 372 pages. ISBN 0521791723 Cryptography is concerned with the conceptualization, definition and construction of computing systems that address security concerns. This book presents a rigorous and systematic treatment of the foundational issues: defining cryptographic tasks and solving new cryptographic problems using existing tools. It...
  • №86
  • 5,06 МБ
  • дата добавления неизвестна
  • изменен
MIT Computer Science and Artificial Intelligence Laboratory; Department of Computer Science and Engineering, University of California San Diego, 2008. - 290 pages. This is a set of lecture notes on cryptography compiled for a one week long course on cryptography taught at MIT 1996-2008. The thread followed by these notes is to develop and explain the notion of provable security...
  • №87
  • 6,14 МБ
  • добавлен
  • изменен
San Diego: University of California, 2001. — 283 p. This is a set of lecture notes on cryptography compiled for 687s, a one week long course on cryptography taught at MIT by Shafi Goldwasser and Mihir Bellare in the summers of 1996-2001. The notes were formed by merging notes written for Shafi Goldwasser's Cryptography and Cryptanalysis course at MIT with notes written for...
  • №88
  • 2,08 МБ
  • добавлен
  • изменен
A-LIST Publishing, 2003. — 412 p. — ISBN:1931769125. Язык: Английский This book gives a general picture of modern cryptography and covers specific issues related to developing fast block ciphers using software and/or hardware implementation in a way that is easily understandable to a wide circle of readers.
  • №89
  • 11,49 МБ
  • добавлен
  • изменен
New York: Springer, 2004. — 360 p. — ISBN: 978-0-387-95387-8. With 149 Illustrations. A cryptographic security architecture is the collection of hardware and software that protects and controls the use of encryption keys and similar cryptovariables. It is the foundation for enforcing computer security policies and controls and preempting system misuse. This book provides a...
  • №90
  • 2,69 МБ
  • добавлен
  • изменен
University of Auckland, 2001. — 224 p. Security Requirements Confidentiality Protection from disclosure to unauthorised persons Integrity Maintaining data consistency Authentication Assurance of identity of person or originator of data Non-repudiation Originator of communications can’t deny it later
  • №91
  • 1,64 МБ
  • добавлен
  • изменен
Springer New York, 2003. — 328 p. — ISBN 978-0-387-95273-4. Introduction and Overview Finite Field Arithmetic Elliptic Curve Arithmetic Cryptographic Protocols Implementation Issues
  • №92
  • 5,35 МБ
  • добавлен
  • изменен
New York: Springer, 2004. — 332 p.: 38 ill. — ISBN 0-387-95273-X. The book has a strong focus on efficient methods for finite field arithmetic and elliptic curve arithmetic Introduction and Overview Cryptography basics Public-key cryptography RSA systems Discrete logarithm systems Elliptic curve systems Why elliptic curve cryptography? Roadmap Notes and...
  • №93
  • 4,37 МБ
  • дата добавления неизвестна
  • изменен
Apress, 2019. — 239 p. Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. The book begins with an...
  • №94
  • 4,52 МБ
  • добавлен
  • изменен
Morrisville, Syncfusion Inc, 2015, — 84 p. Cryptography is the art of protecting information by transforming it (i.e. encrypting it) into an unreadable format called ciphertext. Only those who possess a secret key can decipher (or decrypt) the message into plaintext. Encrypted messages can sometimes be broken by cryptanalysis (also called code breaking) although modern...
  • №95
  • 1,93 МБ
  • добавлен
  • изменен
McGraw-Hill, 2002. - 356 pages. Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. Crypto is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics-but dread the thick tomes that are your...
  • №96
  • 6,39 МБ
  • дата добавления неизвестна
  • изменен
Springer, 2008, 324 pp. Numbers have fascinated people for centuries. They are familiar to everyone, forming a central pillar of our understanding of the world, yet the number system was not presented to us "gift-wrapped" but, rather, was developed over millennia. Today, despite all this development, it remains true that a child may ask a question about numbers that no one can...
  • №97
  • 970,44 КБ
  • добавлен
  • изменен
Chapman & Hall/CRC, 2009. — 287 p. — ISBN-13: 978-1420075182. Cryptography and Network Security. Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the...
  • №98
  • 1,70 МБ
  • добавлен
  • изменен
Springer, 2008. — 532 p. — (Undergraduate Texts in Mathematics). — ISBN: 978-0-387-77993-5. The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret communications. It is hard to overestimate the importance of...
  • №99
  • 5,01 МБ
  • добавлен
  • изменен
Springer, 2008. — 532 p. — (Undergraduate Texts in Mathematics). — ISBN 978-0-387-77993-5. e-ISBN 978-0 -387-77994-2. The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret communications. It is hard to...
  • №100
  • 4,22 МБ
  • добавлен
  • изменен
2nd Edition. — Springer, 2014. — 549 p. The creation of public key cryptography by Diffie and Hellman in 1976 and the subsequent invention of the RSA public key cryptosystem by Rivest, Shamir, and Adleman in 1978 are watershed events in the long history of secret communications. It is hard to overestimate the importance of public key cryptosystems and their associated digital...
  • №101
  • 6,23 МБ
  • добавлен
  • изменен
Princeton University Press, 2017. - 392p. - ISBN: 978-0691141756 The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography--the science of sending secret messages. Most books about cryptography are organized historically, or around how codes and ciphers have been used, such as in government and military intelligence or bank...
  • №102
  • 4,18 МБ
  • добавлен
  • изменен
2nd Edition. — Addison Wesley, 2000. — 521 p. — ISBN 0-201-44124-1. This entire subject is very difficult. I suppose that i wouldn't know that this book was bad if i hadn't read better?Computability: An Introduction to Recursive Function Theory for instance, uses much more understandable language and symbols. In most cases books in this area of language and automata theory...
  • №103
  • 56,62 МБ
  • добавлен
  • изменен
Cambridge University Press, 2001. — 297 p. — ISBN-13: 978-0521807319. This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textbook RSA" into...
  • №104
  • 22,34 МБ
  • добавлен
  • изменен
Springer, 2001. — 148 p. Steganography (literally, covered writing) is the hiding of secret messages within another seemingly innocuous message, or carrier. The carrier can be anything used to transfer information, including, for example, wood or slate tablets, hollow heels, images under stamps, tiny photographs, or word arrangements. Digital carriers include e-mail, audio,...
  • №105
  • 5,37 МБ
  • добавлен
  • изменен
Chapman & Hall ; CRC ; Taylor and Francis Group, 2009. — 500 p. — ISBN-13: 978-1420070026. Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C...
  • №106
  • 2,71 МБ
  • добавлен
  • изменен
Springer, 2000. — 261 p. These are the proceedings of the Conference on Coding Theory, Cryptography, and Number Theory held at the U.S. Naval Academy during October 25-26, 1998. This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. Some of these papers are expository, whereas...
  • №107
  • 3,08 МБ
  • добавлен
  • изменен
Издательство IOS Press, 2011, -139 pp. Linear cryptanalysis, whose original ideas can be traced back to the seminal works of Anne Tardy-Corfdir and Henri Gilbert, A Known Plaintext Attack of FEAL-4 and FEAL-6, presented at Crypto’91, as well as the now classical paper of Eurocrypt’ 93 by Mitsuru Matsui, Linear Cryptanalyis of DES Cipher, has quickly demonstrated to be one of...
  • №108
  • 2,21 МБ
  • добавлен
  • изменен
New York: Macmillan Pub Co, 1974. — 473 p. — ISBN-13: 978-0025604605. Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the Pharaohs. For 4,000 years, fierce battles have been waged between codemakers and codebreakers, and the story of these battles is civilization's secret history, the hidden account of how wars were won and...
  • №109
  • 1,70 МБ
  • добавлен
  • изменен
Диссертация, University of Maryland, 2002, -138 pp. The ease with which digital data can be duplicated and distributed over the media and the Internet has raised many concerns about copyright infringement. In many situations, multimedia data (e.g., images, music, movies, etc.) are illegally circulated, thus violating intellectual property rights. In an attempt to overcome this...
  • №110
  • 555,72 КБ
  • добавлен
  • изменен
Hamburg: Vieweg+Teubner Verlag, 2009. — 267 S. — ISBN 978-3-8348-0884-4. Dieses Lehrbuch bietet einen fundierten Überblick über manche klassische hin zu modernen bis zu brandaktuellen kryptografischen Verfahren. Die Voraussetzungen, die ein Leser mitbringen sollte, konzentrieren sich auf wenige Inhalte der linearen Algebra und Analysis, die im ersten Studienjahr vermittelt...
  • №111
  • 2,26 МБ
  • добавлен
  • изменен
Second Edition. — CRC Press, 2015. — 603 p. — ISBN: 1466570261 Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern...
  • №112
  • 7,49 МБ
  • добавлен
  • изменен
Artech House, 2000. — 237 p. This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of digital media. Until...
  • №113
  • 22,32 МБ
  • добавлен
  • изменен
Morgan Kaufmann (MK), 2008. — 587 p. — ISBN-13: 978-0-12372585-1. 2nd Ed. Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting...
  • №114
  • 10,01 МБ
  • добавлен
  • изменен
Springer, 2010. — 224 p. — ISBN 978-1-4419-0043-2. Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialised problems that arise in digital content distribution. These include...
  • №115
  • 5,17 МБ
  • добавлен
  • изменен
New York: Springer, 2011. — 329 p. — ISBN-13: 978-3-642-18404-8. 9th International Workshop, IWDW 2010, Seoul, Korea, October 1-3, 2010, Revised Selected Papers. On behalf of the Technical Program Committee, we thank all authors, Program Committee members, reviewers, sponsors, invited speaker, and assistants. This 9th workshop was possible due to the help and devotion of...
  • №116
  • 8,79 МБ
  • добавлен
  • изменен
1999. - 326p. The achievements of cryptography, the art of writing and deciphering coded messages, have become a part of everyday life, especially in our age of electronic banking and the Internet. In Code Breaking, Rudolf Kippenhahn offers readers both an exciting chronicle of cryptography and a lively exploration of the cryptographer’s craft. Rich with vivid anecdotes from a...
  • №117
  • 38,71 МБ
  • добавлен
  • изменен
Auerbach Publications, 2004. — 221 p. Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a...
  • №118
  • 7,64 МБ
  • добавлен
  • изменен
World Scientific Publishing Company, 2017. — 460 p. — ISBN 10 9814449458, 13 978-9814449458. Designed to offer a thorough account of the KLJN key exchange system (also known as the Kish Cypher, the Kish Key Distribution, etc.) and its unconditional security, this book explains the scheme's foundation in classical statistical physics and its superiority to its quantum-based...
  • №119
  • 30,19 МБ
  • добавлен
  • изменен
Cambridge University Press, 2014. — 190 p. Cryptography has been in use for at least several thousand years. It is listed in the Kama Sutra as one of the 64 arts to be mastered by women. One well-known elementary cryptosystem is attributed to Julius Caesar. Numerous anecdotes attest to the importance of cryptography in war and diplomacy over the years – and to that of...
  • №120
  • 1,76 МБ
  • добавлен
  • изменен
CRC Press, 2013. — 859 p. Several years ago we were invited to create a new general education math- ematics course for the Honors Academy at Radford University. Wanting to create a multidisciplinary course that would demonstrate some interesting mathematical applications and also be accessible and intriguing to students with a wide variety of interests and backgrounds, we...
  • №121
  • 4,15 МБ
  • добавлен
  • изменен
2nd. ed. - Boca Raton (FL.): CRC Press, 2018. - 496 p. - (Chapman & Hall/CRC Cryptography and Network Security Series) - ISBN 1138047627 Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill...
  • №122
  • 9,67 МБ
  • добавлен
  • изменен
O'Reilly Media, 1998. — 254 p. — ISBN: 1-56592-402-9. Целевая аудитория: опытные Java разработчики. Если ваше приложение работает с особо секретными данными или же вы просто хотите себя обезопасить, в данном прикладном руководстве вы найдёте многочисленные примеры работы известных криптографических шифров и основы их использования на языке Java. Вам не понадобятся предварительные...
  • №123
  • 4,61 МБ
  • добавлен
  • изменен
O'Reilly Media, 2010. — 460 p. — ISBN: 978-1-56592-402-9. Целевая аудитория: опытные Java разработчики. Если ваше приложение работает с особо секретными данными или же вы просто хотите себя обезопасить, в данном прикладном руководстве вы найдёте многочисленные примеры работы известных криптографических шифров и основы их использования на языке Java. Вам не понадобятся...
  • №124
  • 3,00 МБ
  • добавлен
  • изменен
O'Reilly Media, 2010. — 460 p. — ISBN: 978-1-56592-402-9. Целевая аудитория: опытные Java разработчики. Если ваше приложение работает с особо секретными данными или же вы просто хотите себя обезопасить, в данном прикладном руководстве вы найдёте многочисленные примеры работы известных криптографических шифров и основы их использования на языке Java. Вам не понадобятся...
  • №125
  • 1,14 МБ
  • добавлен
  • изменен
O'Reilly Media, 2010. — 460 p. — ISBN: 978-1-56592-402-9. Целевая аудитория: опытные Java разработчики. Если ваше приложение работает с особо секретными данными или же вы просто хотите себя обезопасить, в данном прикладном руководстве вы найдёте многочисленные примеры работы известных криптографических шифров и основы их использования на языке Java. Вам не понадобятся...
  • №126
  • 3,35 МБ
  • добавлен
  • изменен
O'Reilly Media, 1998. — 254 p. — ISBN: 1-56592-402-9. Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity...
  • №127
  • 1,47 МБ
  • добавлен
  • изменен
2nd edition. — Springer, 1994. — 235 p. — ISBN 0-387-94293-9 The purpose of this book is to introduce the reader to arithmetic topics, both ancient and modern, that have been at the center of interest in applications of number theory, particularly in cryptography. No background in algebra or number theory is assumed, and the book begins with a discussion of the basic number...
  • №128
  • 3,22 МБ
  • дата добавления неизвестна
  • изменен
Springer, 2008. — 528 p. — ISBN: 978-0-387-71816-3. This book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type material for professional engineers and computer information specialists. Cryptography is an ancient art. Chinese,...
  • №129
  • 16,80 МБ
  • добавлен
  • изменен
Выходные данные неизвестны, 1998. — 62 p. Transmitting messages across noisy channels is an important practical problem. Coding theory provides explicit ways of ensuring that messages remain legible even in the presence of errors. Cryptography on the other hand, makes sure that messages remain unreadable — except to the intended recipient. These complementary techniques turn...
  • №130
  • 505,60 КБ
  • добавлен
  • изменен
Springer, 2013. — 238 p. Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering...
  • №131
  • 6,78 МБ
  • добавлен
  • изменен
New York: Chapman and Hall/CRC, 2018. — 583 p. Building on the success of the first edition, An Introduction to Number Theory with Cryptography, Second Edition, increases coverage of the popular and important topic of cryptography, integrating it with traditional topics in number theory. The authors have written the text in an engaging style to reflect number theory's increasing...
  • №132
  • 2,96 МБ
  • добавлен
  • изменен
London — Bombay — Sydney: Constable & Company Limited, 1922. — VIII + 192 p. «I have no intention of writing a complete manual of cryptography. Finality, even very relative, is not attainable in the domain of this art. Besides, good manuals are in existence on this subject, and the titles of some of them will be found at the end of this volume. A cryptographer of considerable...
  • №133
  • 9,18 МБ
  • добавлен
  • изменен
Second Edition. — Chapman & Hall ; CRC, 2008. — 524 p. — ISBN: 978-1-4200-7146-7. University of Maryland. Like its bestselling predecessor, Elliptic Curves: Number Theory and Cryptography, Second Edition develops the theory of elliptic curves to provide a basis for both number theoretic and cryptographic applications. With additional exercises, this edition offers more...
  • №134
  • 4,63 МБ
  • добавлен
  • изменен
New York: Auerbach Publications, 2008. — 238 p. — ISBN: 1420065270. How to Design a Secure Multimedia Encryption Scheme. The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or...
  • №135
  • 8,29 МБ
  • добавлен
  • изменен
CRC Press, 2013. — 333 p. Algebraic curves over finite fields have been studied by mathematicians at least as far back as Gauss more than two centuries ago. Tremendous progress was made on this topic in the 20th century, with the seminal work of Hasse and Weil in the 1930s and 1940s on the number of points on such curves, as well as many other important discoveries. A new...
  • №136
  • 1,87 МБ
  • добавлен
  • изменен
Springer, 2014. - 145 p., English, This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS....
  • №137
  • 5,38 МБ
  • добавлен
  • изменен
Cambridge University Press, 2006. — 305 p. — ISBN-13: 978-0521534765. For many everyday transmissions, it is essential to protect digital information from noise or eavesdropping. This undergraduate introduction to error correction and cryptography is unique in devoting several chapters to quantum cryptography and quantum computing, thus providing a context in which ideas from...
  • №138
  • 986,01 КБ
  • добавлен
  • изменен
Baltimore, University of Maryland Baltimore County, 54 pp. The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unau- unauthorized eavesdropping should it occur, and which...
  • №139
  • 374,78 КБ
  • добавлен
  • изменен
Baltimore, University of Maryland Baltimore County, 54 pp. The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unau- unauthorized eavesdropping should it occur, and which...
  • №140
  • 371,12 КБ
  • добавлен
  • изменен
Syngress, 2013 — 114 p. — ISBN: 0124114830, 9780124114838 Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for...
  • №141
  • 6,56 МБ
  • добавлен
  • изменен
Издательство Idea Group, 2005, -269 pp. In this digital era, the ubiquitous network environment has promoted the rapid delivery of digital multimedia data. Users are eager to enjoy the convenience and advantages that networks have provided. Meanwhile, users are eager to share various media information in a rather cheap way without awareness of possibly violating copyrights. In...
  • №142
  • 3,21 МБ
  • добавлен
  • изменен
New Jersey: Prentice Hall PTR, 2003. — 648 p. — ISBN: 0-13-066943-1. Appropriate for all graduate-level and advanced undergraduate courses in cryptography and related mathematical fields. Modern Cryptography is an indispensable resource for every advanced student of cryptography who intends to implement strong security in real-world applications. Leading HP security expert...
  • №143
  • 17,80 МБ
  • добавлен
  • изменен
Oxford: Oxford University Press, 2012. — 592 p. — ISBN-13 978-0199695591. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local...
  • №144
  • 2,39 МБ
  • добавлен
  • изменен
Oxford University Press, 2012. — 560 p. — ISBN-13 978-0199695591. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area...
  • №145
  • 4,30 МБ
  • добавлен
  • изменен
Oxford University Press, 2012. — 560 p. — ISBN-13 978-0199695591. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area...
  • №146
  • 2,71 МБ
  • добавлен
  • изменен
2nd. ed. — Oxford: Oxford University Press, 2017. — 685 p. When this book was first published in 2012, it was argued to be relatively timeless and hence would be just as relevant in 2022 as it would have been in 2002. This is because the focus was on fundamental principles and not the latest technology. So, is a second edition really needed ? I stand by the initial statement, so...
  • №147
  • 10,54 МБ
  • добавлен
  • изменен
2nd. ed. — Oxford: Oxford University Press, 2017. — 685 p. When this book was first published in 2012, it was argued to be relatively timeless and hence would be just as relevant in 2022 as it would have been in 2002. This is because the focus was on fundamental principles and not the latest technology. So, is a second edition really needed ? I stand by the initial statement, so...
  • №148
  • 6,66 МБ
  • добавлен
  • изменен
2nd Edition. — Oxford University Press, 2017. — 773 p. — ISBN-10 0198788002; ISBN-13 978-0198788003. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones,...
  • №149
  • 9,84 МБ
  • добавлен
  • изменен
No Starch Press, 2018. — 248 p. Cryptography is hard, but it’s less hard when it’s filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding thief to justice, you’ll...
  • №150
  • 91,49 МБ
  • добавлен
  • изменен
Wiley–IEEE Press, 2016. — 293 p. — (IEEE Press Series on Information and Communication Networks Security). — ISBN 978-1118861691. Describes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development trends and potential future directions of Information Hiding Introduces a new classification and...
  • №151
  • 37,25 МБ
  • добавлен
  • изменен
CRC Press, 2011. — 456 p. The growth of cryptography as both an academic discipline and a teaching subject has exploded over the last few decades. Once the privilege of the very few—and those few working in secret—cryptography is now taught in some form at universities the world over, and new books are being published with amazing rapidity. Before 1990, only 58 books...
  • №152
  • 1,73 МБ
  • добавлен
  • изменен
Springer US, 2003. — 160 p. — ISBN 978-1-4613-4897-9. Background Theory Des Algorithm Architectures and Implementations Rijndael Architectures and Implementations Further Rijndael Algorithm Architectures and Implementations Hash Algorithms and Security Applications Concluding Summary and Future Work
  • №153
  • 14,35 МБ
  • добавлен
  • изменен
Springer International Publishing, Switzerland, 2016. — 311 p. — ISBN: 3319303953 This textbook provides an introduction to the mathematics on which modern cryptology is based. It covers not only public key cryptography, the glamorous component of modern cryptology, but also pays considerable attention to secret key cryptography, its workhorse in practice. Modern cryptology...
  • №154
  • 3,08 МБ
  • добавлен
  • изменен
CRC Press, 1996. - 816 p. The Handbook of Applied Cryptography serves as a valuable reference for novices as well as for experts. It provides a multifunctional treatment that introduces the more practical aspects of both conventional and public-key cryptography, and offers a valuable source of techniques and algorithms for serious practitioners. The book contains enough...
  • №155
  • 3,81 МБ
  • дата добавления неизвестна
  • изменен
Springer International Publishing, Switzerland, 2016. — 561 p. — ISBN 978-3-319-32593-4. This book gives a detailed survey of the main results on bent functions over finite fields, presents a systematic overview of their generalizations, variations and applications, considers open problems in classification and systematization of bent functions, and discusses proofs of several...
  • №156
  • 6,42 МБ
  • добавлен
  • изменен
New York: CyberTech Publishing, 2008. — 490 p. — ISBN: 159904837X. Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security...
  • №157
  • 60,35 МБ
  • добавлен
  • изменен
Second Edition. — Boston: Charles River Media, 2006. — 400 p. — (Programming Series). — ISBN: 1584504676. Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions....
  • №158
  • 6,55 МБ
  • добавлен
  • изменен
New York: Chapman & Hall/CRC, 2005. - 700 pp. ISBN 1-58488-470-3 From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the...
  • №159
  • 4,09 МБ
  • добавлен
  • изменен
Second Edition. — Chapman and Hall / CRC, 2006. — 413 p. — ISBN-13 978-1584886181. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography. Continuing a bestselling tradition, An...
  • №160
  • 1,07 МБ
  • добавлен
  • изменен
Chapman & Hall ; CRC, 2002. — 275 p. — ISBN 1-58488-338-3. This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume...
  • №161
  • 1,98 МБ
  • добавлен
  • изменен
CRC Press, 2017. — 436 p. — ISBN 1498729509. This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to...
  • №162
  • 5,80 МБ
  • добавлен
  • изменен
СПб.: БХВ-Петербург, 2015. -304 с. Приведено краткое изложение математических результатов, используемых при синтезе и анализе криптосистем с открытым ключом, и ряда классических и новых криптосистем этого типа, включая достаточно большое число схем электронной цифровой подписи (ЭЦП). Основная часть книги содержит материалы для проведения практических занятий: формулировки заданий...
  • №163
  • 3,03 МБ
  • добавлен
  • изменен
Sofia: SoftUni, 2018. — 189 p. A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated encryption,...
  • №164
  • 7,27 МБ
  • добавлен
  • изменен
SoftUni, 2018. — 214 p. — ISBN 9786190008705. A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes, authenticated...
  • №165
  • 4,41 МБ
  • добавлен
  • изменен
James Nechvatal, Elaine Barker, Lawrence Bassham, William Burr, Morris Dworkin, James Foti, Edward Roback. National Institute of Standards and Technology (NIST), 2000. — 116 p. The National Institute of Standards and Technology (NIST) has been working with the international cryptographic community to develop an Advanced Encryption Standard (AES). The overall goal is to...
  • №166
  • 383,41 КБ
  • добавлен
  • изменен
CRC Press, 2011. — 408 p. Cryptography is the art and science of concealment of information. Without the ability to conceal information, the current networked computing environment would not be possible. In the most fundamental way, cryptography provides a logical barrier to secure information from unauthorized prying eyes. To understand cryptography, we need to answer four...
  • №167
  • 3,80 МБ
  • добавлен
  • изменен
Printservice Technische Universiteit Eindhoven, 2012. — 125 p. Most of today’s cryptographic primitives are based on computations that are hard to perform for a potential attacker but easy to perform for somebody who is in possession of some secret information, the key, that opens a back door in these hard computations and allows them to be solved in a small amount of time. Each...
  • №168
  • 1,08 МБ
  • добавлен
  • изменен
Princeton University Press, 273 pp. This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular...
  • №169
  • 1,35 МБ
  • добавлен
  • изменен
New York: Springer, 2009. — 189 p. — ISBN-13: 978-0-387-75629-5. The volume provides state-of-the-art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient...
  • №170
  • 3,04 МБ
  • добавлен
  • изменен
Artech House, 2005. — 530 p. — ISBN 1-58053-642-5. Contemporary Cryptography is written to be comprehensive and tutorial in nature. The book starts with two chapters that introduce the topic and briefly overview the cryptographic systems (or cryptosystems) in use today. After a thorough introduction of the mathematical fundamentals and principles that are at the heart of...
  • №171
  • 2,24 МБ
  • добавлен
  • изменен
Second Edition. — Artech House, 2016. — 301 p. — ISBN-10 1608079988; ISBN 13 978-1-60807-998-8. This completely expanded second edition of SSL and TLS: Theory and Practice provides modernized material and a comprehensive overview of the SSL/TLS and DTLS protocols, including topics such as firewall traversal and public key certificates. SSL (secure socket layer) and TLS (Transport...
  • №172
  • 2,44 МБ
  • добавлен
  • изменен
Oracle Corporation, 1997. — 112 p. Release 2.0.4. The Oracle Cryptographic Toolkit Programmer’s Guide provides independent application programmers with programming interfaces to the services provided by the Oracle Security Server. The Oracle Cryptographic Toolkit Programmer’s Guide is designed to be used by both Oracle and non-Oracle application programmers who require an...
  • №173
  • 942,22 КБ
  • добавлен
  • изменен
McGraw-Hill Education, 2013. — 321 p. — (Networking & Comm - OMG). — ISBN 10 0071794255. — ISBN 13 978-0071794251. This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable,...
  • №174
  • 13,70 МБ
  • добавлен
  • изменен
Berlin: Springer-Verlag, 2010. — 372 p. — ISBN 978-3-642-04100-6 e-ISBN 978-3-642-04101-3 Uniquely designed for students of engineering and applied computer science, and engineering practitioners. Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web...
  • №175
  • 6,81 МБ
  • добавлен
  • изменен
Boca Raton: CRC Press, 2018. — 258 p. Contents : Foreword Preface Contents Overview of Cryptography Introduction Goals of Cryptography Classification of Cryptosystem Practically Useful Cryptosystem Cryptanalysis Basic Algebra Group Ring Field Exercises Number Theory Prime Numbers Cardinality of Primes Extended Euclidean Algorithm Congruences Integer Factorization Problem Primality...
  • №176
  • 2,58 МБ
  • добавлен
  • изменен
New York: Springer-Verlag, 2007. — 402 p. — (Studies in Computational Intelligence, Volume 58.) — ISBN-13 978-3-540-71168-1. This book lays out all the latest research in the area of multimedia data hiding. The book introduces multimedia signal processing and information hiding techniques. It includes multimedia representation, digital watermarking fundamentals and requirements...
  • №177
  • 12,56 МБ
  • добавлен
  • изменен
Springer, 2013. — 153 p. Welcome to the first edition of the book “Embedded Multimedia Security Systems: Algorithms and Architectures”. The main objective behind this book is NOT to serve as a textbook or a book which gives readers a thorough understanding of security approaches in embedded multimedia systems. Rather, our goal is to stimulate creative thinking in the readers to...
  • №178
  • 1,77 МБ
  • добавлен
  • изменен
Springer, 2013. - 725 p., English, ISBN-10: 3642321658 - PDF, 10,7 MB. (+ дополнительные материалы с сайта поддержки - source code, errata, e.t.c.) This introduction to cryptography employs a programming-oriented approach to study the most important cryptographic schemes in current use and the main cryptanalytic attacks against them. Discussion of the theoretical aspects,...
  • №179
  • 10,47 МБ
  • добавлен
  • изменен
Cambridge University Press, 2018. — 609 p. — ISBN 978-0-521-81711-0. This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is...
  • №180
  • 8,68 МБ
  • добавлен
  • изменен
Auerbach Publications, 2003. — 261 p. — ISBN 0-8493-1957-9. Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...
  • №181
  • 5,82 МБ
  • добавлен
  • изменен
Dover, 1933, 191 pp. The origins of this book are interesting. Two years or more ago a distinguished young scientist was sitting for an examination. One of the questions set him was the well-known "Intelligence Test" about the guard, fireman and engine-driver. Amused by the question, he took it home and showed it to his father, S. K. Ratcliffe. Mr. Ratcliffe showed it to Kingsley...
  • №182
  • 1,33 МБ
  • добавлен
  • изменен
CreateSpace, 2017. — 158 p. The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples...
  • №183
  • 5,53 МБ
  • добавлен
  • изменен
CreateSpace, 2017. — 158 p. The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples...
  • №184
  • 2,47 МБ
  • добавлен
  • изменен
CreateSpace, 2017. — 158 p. The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples...
  • №185
  • 2,52 МБ
  • добавлен
  • изменен
Oxford University Press, 2002. - 142 pages. This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers,...
  • №186
  • 3,00 МБ
  • добавлен
  • изменен
Oxford University Press, 2002. — 142 p. — (Very Short Introductions). — ISBN-13: 978-0192803153. This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned....
  • №187
  • 1,30 МБ
  • добавлен
  • изменен
Год издания: 2003 338 pp. The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash functions are reviewed. The information...
  • №188
  • 1,40 МБ
  • добавлен
  • изменен
2nd Edition. — Certitrek Publishing, 2017. — 461 p. — ISBN: 978-0-9971607-2-7 CWSP Certified Wireless Security Professional Official Study Guide- Second Edition: The Certified Wireless Security Professional (CWSP exam (CWSP-205) proves your knowledge of 802.11 wireless LAN security solutions. This study guide provides you with the knowledge you need to prepare for the exam and...
  • №189
  • 16,24 МБ
  • добавлен
  • изменен
Wiley Publishing, Inc., 2003. – 337 pages. The audience for this book can be quite varied, ranging from novices in PKI technology to security experts looking to gain specific knowledge. In general, the first part of the book has been designed to give an overview of the PKI technology along with the challenges and advantages the technology offers. The next part of the book would...
  • №190
  • 2,68 МБ
  • добавлен
  • изменен
San Francisco: Wiley, 2003. — 426 p. — ISBN 0-470-85285-2 Язык: English Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level...
  • №191
  • 1,84 МБ
  • добавлен
  • изменен
Feisty Duck, 2014. — 568 p. Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right...
  • №192
  • 2,89 МБ
  • добавлен
  • изменен
Feisty Duck, 2014. — 568 p. Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right...
  • №193
  • 7,20 МБ
  • добавлен
  • изменен
Ritter Software Engineering, 1999. — 941 p. These pages are published property, just like a book or magazine. Most of this material has been previously published. Many of the articles in this collection were released to Usenet News for general computer distribution. This work was privately conducted without governmental, educational or commercial support.
  • №194
  • 8,36 МБ
  • добавлен
  • изменен
Springer-Verlag, Berlin, Heidelberg, 2008, 301 pages, ISBN: 354068350X This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would...
  • №195
  • 3,48 МБ
  • добавлен
  • изменен
New York: Springer, 2006. — 384 p. — (Signals and Communication Technology). — ISBN-13: 978-0-387-33883-5. Cryptographic solutions using software methods can be used for those security applications where data traffic is not too large and low encryption rate is tolerable. On the other hand, hardware methods offer high-speed solutions making them highly suitable for applications...
  • №196
  • 15,84 МБ
  • добавлен
  • изменен
Omsk : Omsk State University Publishing House, 2018. - 208 p. This book is concerned with algebraic cryptography , where the design and analysis of cryptographic schemes are based on algebraic structures: nonabelian groups, rings, algebras, and so on. The focus of this book is on algebraic cryptanalysis of public-key schemes, systems and protocols. We show that different methods...
  • №197
  • 1,26 МБ
  • добавлен
  • изменен
Chapman & Hall/CRC, 2011. – 612 p. – ISBN: 1420059815, 9781420059816 Cryptography and Network Security Series. The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography. It applies various cryptographic techniques to auctions,...
  • №198
  • 16,08 МБ
  • добавлен
  • изменен
RSA Data Security, 1998. — 216 p. RSA BSAFE Crypto-C, RSA BSAFE Crypto-J, PKCS, S/WAN, RC2, RC4, RC5, MD2, MD4, and MD5 are trademarks or registered trademarks of RSA Data Security, Inc. Other products and names are trademarks or registered trademarks of their respective owners. For permission to reprint or redistribute in part or in whole, send e-mail to pubs@rsa.com or...
  • №199
  • 1,17 МБ
  • добавлен
  • изменен
Springer, 2018. — 259 p. — (Springer Undergraduate Mathematics Series). — ISBN 3319948172. This text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication. Beginning with classical ciphers and their cryptanalysis, this book proceeds to focus on modern public key cryptosystems such as Diffie-Hellman, ElGamal, RSA, and elliptic...
  • №200
  • 3,35 МБ
  • добавлен
  • изменен
Singapore: World Scientific, 2005. - 208p The aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main...
  • №201
  • 3,11 МБ
  • добавлен
  • изменен
Springer, 2016. — 551 p. This Festschrift volume is published in honor of David Kahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion of David Kahn’s 80th birthday. The title of this books leans on the title of a serious history of cryptology named “The Codebreakers”, written by David Kahn and published in 1967. This book contains 35 talks dealing with...
  • №202
  • 8,83 МБ
  • добавлен
  • изменен
Издательство InTech, 2012, -100 pp. The information concealment concerns the process of integrating information or data elements into images, video, and music. This book presents the latest advances in the area of Steganography, a relatively new technique in information hiding. In chapter 1, steganalysis is introduced as the task of discovering the presence of secret data....
  • №203
  • 1,79 МБ
  • добавлен
  • изменен
John Wiley & Sons, 2003. — 490 p. — ISBN: 978-0-470-84745-9. A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve...
  • №204
  • 12,04 МБ
  • добавлен
  • изменен
2nd edition. — John Wiley & Sons, 1996. — 662 p. — ISBN 0471128457. There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you...
  • №205
  • 2,78 МБ
  • добавлен
  • изменен
Издательство John Wiley, 1996, -1027 pp. There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter. If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...
  • №206
  • 8,31 МБ
  • добавлен
  • изменен
20th Anniversary Edition. — Wiley, 2015. — 784 p. — ISBN 978-1-119-09672-6. From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding...
  • №207
  • 13,76 МБ
  • добавлен
  • изменен
20th Anniversary Edition. — Wiley, 2015. — 784 p. — ISBN 978-1-119-09672-6. From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding...
  • №208
  • 21,51 МБ
  • добавлен
  • изменен
2nd edition. — John Wiley & Sons, 1996. — 666 p. — ISBN 0471128457. This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography -- the technique of enciphering and deciphering messages -- to maintain the privacy of computer data. It...
  • №209
  • 2,99 МБ
  • добавлен
  • изменен
Ediorial data unknown, 1989. — 674 p. In 1988, the New Encyclopedia Britannica defined cryptology as: The science concerned with communications in secure and usually secret form. It encompasses both cryptography and cryptanalysis. The former involves the study and application of the principles and techniques by which information is rendered unintelligible to all but the...
  • №210
  • 3,75 МБ
  • добавлен
  • изменен
University of Cooperative Education Heidenheim, Germany. — Hershey: Information Science Publishing, 2005. — 262 p. — ISBN 1-59140-518-1. Digital Watermarking for Digital Media discusses the new aspects of digital watermarking in a worldwide context. Approached not only from the technical side, but the business and legal sides as well, this book discusses digital watermarking as...
  • №211
  • 4,79 МБ
  • добавлен
  • изменен
InTech, 2012. — 390 p. We live in an era of unimaginably rapidly advancing and amazing technologies that enable instantaneous flow of information – anytime, anywhere. The convergence of computers and networks has been the key force behind the development of these awesome technologies. Increasing use of systems which are built using advanced information technologies is having a...
  • №212
  • 6,50 МБ
  • добавлен
  • изменен
Издательство InTech, 2012. - 256 p. During the last three decades, public academic research in cryptography has exploded. While classical cryptography has been long used by ordinary people, computer cryptography was the exclusive domain of the world’s militaries since the World War II. Today, state-of the-art computer cryptography is practiced outside the secured walls of the...
  • №213
  • 3,23 МБ
  • добавлен
  • изменен
Academic Press, 2004. — 254 p. Multimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns...
  • №214
  • 1,54 МБ
  • добавлен
  • изменен
World Scientific, 2007 - 268 p. In the new era of technology and advanced communications, coding theory and cryptography play a particularly significant role with a huge amount of research being done in both areas. This book presents some of that research, authored by prominent experts in the field. The book contains articles from a variety of topics most of which are from coding...
  • №215
  • 1,79 МБ
  • добавлен
  • изменен
World Scientific, 2007. — 267 p. — (Series on Coding Theory and Cryptology, Vol. 3.) — ISBN-13: 978-981-270-701-7. In the new era of technology and advanced communications, coding theory and cryptography play a particularly significant role with a huge amount of research being done in both areas. This book presents some of that research, authored by prominent experts in the...
  • №216
  • 1,55 МБ
  • добавлен
  • изменен
Springer, 2006. — 146 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement...
  • №217
  • 1,71 МБ
  • добавлен
  • изменен
Springer, 2008. — 98 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement...
  • №218
  • 1,62 МБ
  • добавлен
  • изменен
Springer, 2009. — 111 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement...
  • №219
  • 2,64 МБ
  • добавлен
  • изменен
Springer, 2014. — 140 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each...
  • №220
  • 24,96 МБ
  • добавлен
  • изменен
Springer, 2010. — 139 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement...
  • №221
  • 3,60 МБ
  • добавлен
  • изменен
Springer, 2012. — 123 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement...
  • №222
  • 2,83 МБ
  • добавлен
  • изменен
Springer, 2012. — 110 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image authentication. Data hiding and cryptographic techniques are often combined to complement...
  • №223
  • 1,47 МБ
  • добавлен
  • изменен
Springer, 2015. — 115 p. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval and image authentication. Data hiding and cryptographic techniques are often combined to complement each...
  • №224
  • 9,35 МБ
  • добавлен
  • изменен
NewYork: Springer-Verlag, 2007. — 123 p. — ISBN-13: 978-3-540-73091-0. Lecture Notes in Computer Science. Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication, and is now used in various applications including broadcast monitoring, movie fingerprinting, steganography, video indexing and retrieval, and image...
  • №225
  • 10,72 МБ
  • добавлен
  • изменен
Издательство CRC Press, 2013, -411 pp. Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, technical information, and expert insights on multimedia security technology used to prove that content is authentic and has not been altered. Illustrating the need for improved content security as the Internet and digital multimedia applications...
  • №226
  • 6,66 МБ
  • добавлен
  • изменен
CRC Press, 2007. — 202 p. Digital watermarking and steganography is an important topic because digital multimedia is widely used and the Internet is rapidly growing. This book intends to provide a comprehensive overview on the different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals who take the related...
  • №227
  • 3,06 МБ
  • добавлен
  • изменен
2nd ed. — CRC Press, 2017. — 293 p. — ISBN 1498738761. This book intends to provide a comprehensive overview on different aspects of mechanisms and techniques for information security. It is written for students, researchers, and professionals studying in the field of multimedia security and steganography. Multimedia security and steganography is especially relevant due to the...
  • №228
  • 24,58 МБ
  • добавлен
  • изменен
Harpercollins, 1999. — 432 p. The Science of Secrecy from Ancient Egypt to Quantum Cryptography From the best-selling author of Fermat's Last Theorem, The Code Book is a history of man's urge to uncover the secrets of codes, from Egyptian puzzles to modern day computer encryptions. As in Fermat's Last Theorem, Simon Singh brings life to an anstonishing story of puzzles, codes,...
  • №229
  • 9,51 МБ
  • добавлен
  • изменен
Harpercollins, 1999. — 432 p. The Science of Secrecy from Ancient Egypt to Quantum Cryptography From the best-selling author of Fermat's Last Theorem, The Code Book is a history of man's urge to uncover the secrets of codes, from Egyptian puzzles to modern day computer encryptions. As in Fermat's Last Theorem, Simon Singh brings life to an anstonishing story of puzzles, codes,...
  • №230
  • 11,39 МБ
  • добавлен
  • изменен
New York: Anchor books, 2000. — 432 p. — eISBN 978-0-307-78784-2. The Cipher of Mary Queen of Scots Le Chiffre Indéchiffrable The Mechanization of Secrecy Cracking the Enigma The Language Barrier Alice and Bob Go Public Pretty Good Privacy A Quantum Leap into the Future
  • №231
  • 5,05 МБ
  • добавлен
  • изменен
Anchor Books, 2000. - 432 pages. People love secrets. Ever since the first word was written, humans have sent coded messages to each other. In The Code Book, Simon Singh, author of the bestselling Fermat's Enigma, offers a peek into the world of cryptography and codes, from ancient texts through computer encryption. Singh's compelling history is woven through with stories of...
  • №232
  • 2,82 МБ
  • дата добавления неизвестна
  • изменен
Delacorte Books for Young Readers, 2002. — 120 р. It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...
  • №233
  • 10,27 МБ
  • добавлен
  • изменен
Delacorte Books for Young Readers, 2002. — 120 р. It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...
  • №234
  • 5,04 МБ
  • добавлен
  • изменен
Mathematical Association of America, 2009. — 227 p. Most people, acquainted with cryptology either through sensational cloak and dagger stories or through newspaper cryptograms, are not aware that many aspects of this art may be treated systematically, by means of some elementary mathematical concepts and methods. In this introduction, Professor Sinkov explains some of the...
  • №235
  • 3,26 МБ
  • добавлен
  • изменен
Издательство CRC Press, 2007, -418 pp. Wireless communications have become a very attractive and interesting sector for the provision of electronic services. Mobile networks are available almost anytime and anywhere, and the popularity of wireless handheld devices is high. The services offered are strongly increasing because of the wide range of the users’ needs. They vary from...
  • №236
  • 2,82 МБ
  • добавлен
  • изменен
Springer, 2016. — 478. In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The chapters in Part 1 offer a brief introduction to the mathematical...
  • №237
  • 2,52 МБ
  • добавлен
  • изменен
McGraw-Hill College, 2004. — 436 p. Preface To Third Edition Preface To Second Edition Mathematical Background Symmetric Encryption Public Key Encryption and Signatures Security Issues Advanced Protocols Appendix
  • №238
  • 3,52 МБ
  • добавлен
  • изменен
Syngress Publishing, 2007. — 446 p. — ISBN-13: 978-1-59749-104-4. The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message...
  • №239
  • 12,01 МБ
  • добавлен
  • изменен
Издательство Prentice Hall, 2005, -592 pp. In this age of viruses and hackers, of electronic eavesdropping and electronic fraud, security is paramount. As the disciplines of cryptography and network security have matured, more practical, readily available applications to enforce network security have developed. This text provides a practical survey of both the principles and...
  • №240
  • 12,39 МБ
  • добавлен
  • изменен
Pearson Education, 2010. - 900 p. ISBN: 0136097049, 5th Edition William Stallings' Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud,...
  • №241
  • 7,98 МБ
  • добавлен
  • изменен
Prentice Hall, 2013. — 752 p. — 6th ed. — ISBN: 0133354695, 9780133354690 For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-study and so provides a solid and up-to-date tutorial. The book is also a comprehensive treatment of cryptography and network security and so is suitable as a...
  • №242
  • 12,62 МБ
  • добавлен
  • изменен
7th ed. — Pearson, 2016. — 752 p. — ISBN 9781292158587. The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security, Seventh Edition, introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale,...
  • №243
  • 9,03 МБ
  • добавлен
  • изменен
Wiley-IEEE Press, 2007. — 401 p. — ISBN 978-0-470-1 1486-5. The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to...
  • №244
  • 18,70 МБ
  • добавлен
  • изменен
CRC Press Taylor & Francis Group.-2018.-205p.-ISBN-10 0815396414 Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically...
  • №245
  • 9,22 МБ
  • добавлен
  • изменен
CRC Press, 2018. — 205 p. — ISBN 0815396414. Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the...
  • №246
  • 6,43 МБ
  • добавлен
  • изменен
Chapman & Hall/CRC, 2005. - 616 pages. Douglas R. Stinson's Cryptography: Theory and Practice is a mathematically intensive examination of cryptography, including ciphers, the Data Encryption Standard (DES), public key cryptography, one-way hash functions, and digital signatures. Stinson's explication of "zero-sum proofs" - a process by which one person lets another person know...
  • №247
  • 2,90 МБ
  • дата добавления неизвестна
  • изменен
4th Edition. — Boca Raton, USA: CRC Press, 2019. — 599 p. — (Textbooks in Mathematics). — ISBN-13 978-1-1381-9701-5. Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography. The authors offer...
  • №248
  • 22,74 МБ
  • добавлен
  • изменен
4th edition. — Boca Raton: CRC Press, Taylor & Francis Group, 2019. — XVIII+580 pp. — (Textbooks in Mathematics). — ISBN 978-1-1381-9701-5. There have been many exciting advances in cryptography since the publication of the first edition of this book 23 years ago. At the same time, many of the “core” areas of cryptography that were important then are still relevant now—providing a...
  • №249
  • 2,49 МБ
  • добавлен
  • изменен
CRC Press, 1995. — 573 p. — ISBN: 0849385210. Douglas R. Stinson's Cryptography: Theory and Practice is a mathematically intensive examination of cryptography, including ciphers, the Data Encryption Standard (DES), public key cryptography, one-way hash functions, and digital signatures. Stinson's explication of "zero-sum proofs"--a process by which one person lets another...
  • №250
  • 16,82 МБ
  • добавлен
  • изменен
4th Edition. — Chapman and Hall/CRC, 2018. — (Textbooks in Mathematics). — ISBN-10 1138197017. Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment...
  • №251
  • 22,74 МБ
  • добавлен
  • изменен
Vuibert Informatique, 2003. — 401 p. — ISBN 2-7117-8675-7. Language: French. Traducteur : Serge Vaudenay. Je suis nouvelle sur ce forum, débutante en cryptographie et je viens consulter les spécialistes. J'ai commencé la lecture du livre 'Cryptographie Théorie et pratique' de Douglas Stinson, traduction française de Serge Vaudenay. Douglas R. Stinson's Cryptography:...
  • №252
  • 3,88 МБ
  • добавлен
  • изменен
Indianapolis: Wiley Publishing, 2009. — 339 p. — ISBN: 978-0-470-59100-0. The fast and easy way to crack codes and cryptograms. Did you love Dan Brown's The Lost Symbol? Are you fascinated by secret codes and deciphering lost history? Cracking Codes and Cryptograms For Dummies shows you how to think like a symbologist to uncover mysteries and history by solving cryptograms and...
  • №253
  • 8,96 МБ
  • добавлен
  • изменен
Wiley Publishing, Inc., 2008. — 264 p. — ISBN: 047013593X As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on...
  • №254
  • 5,75 МБ
  • добавлен
  • изменен
Springer Nature Singapore Pte Ltd., 2018. — 363 p. — (Mathematics for Industry 29). — ISBN 978-981-10-5064-0. This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing...
  • №255
  • 6,50 МБ
  • добавлен
  • изменен
Cambridge University Press, 2006. - 304 pages. Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics. This book...
  • №256
  • 3,28 МБ
  • добавлен
  • изменен
NY: Wiley, 2000. — 212 p. — ISBN-10: 0471383546 — ISBN-13: 978-0471383543 The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now-for the first time the...
  • №257
  • 1,36 МБ
  • добавлен
  • изменен
John Wiley & Sons, 2000. — 212 p. — ISBN-13: 978-0471383543. The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now-for the first time the details of...
  • №258
  • 1,36 МБ
  • добавлен
  • изменен
Prentice Hall PTR, 2003. — 477 p. — ISBN: 0-131-00851-X. Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. .NET Security and Cryptography is a practical and...
  • №259
  • 11,03 МБ
  • добавлен
  • изменен
Prentice Hall PTR, 2003. — 477 p. — ISBN: 0-131-00851-X. Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. .NET Security and Cryptography is a practical and...
  • №260
  • 3,09 МБ
  • добавлен
  • изменен
New York: Auerbach Publications, 2007. — 756 p. — ISBN-13: 978-1420052190. User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism...
  • №261
  • 16,66 МБ
  • добавлен
  • изменен
2nd edition. — Uppder Saddle River: Pearson Education Int, 2006. — 591 p. With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in...
  • №262
  • 12,91 МБ
  • добавлен
  • изменен
Prentice Hall, 2002. - 487 Pages. This book assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra. It provides a flexible organization, as each chapter is modular and can be covered in any order. Using Mathematica, Maple, and MATLAB, computer examples included in an Appendix explain how to do computation and...
  • №263
  • 2,77 МБ
  • дата добавления неизвестна
  • изменен
Cambridge University Press, 2006, 261 pages Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This self-contained text introduces the principles and techniques of quantum cryptography, setting it in the wider context of cryptography and security, with...
  • №264
  • 1,56 МБ
  • добавлен
  • изменен
Copyright 2013-2016, Laurens Van Houtven This work is available under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) license. Contents I Foreword About this book Advanced sections Development Acknowledgments II Building blocks Exclusive OR Block ciphers Stream ciphers Key exchange Public-key encryption Hash functions Message...
  • №265
  • 15,51 МБ
  • добавлен
  • изменен
Swiss Federal Institute of Technologies (EPFL). — New York: Springer, 2006. — 343 p. — ISBN-13: 978-0-387-25464-7. A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This...
  • №266
  • 1,35 МБ
  • добавлен
  • изменен
World Scientific, 2014 © 2015. — 458 p. — ISBN 978-9814623742 Integer Algorithms in Cryptology and Information Assurance is a collection of the author's own innovative approaches in algorithms and protocols for secret and reliable communication. It concentrates on the "what" and "how" behind implementing the proposed cryptographic algorithms rather than on formal proofs of...
  • №267
  • 2,86 МБ
  • добавлен
  • изменен
O'Reilly, 2003. — 784 р. — ISBN: 0-596-00394-3. The book's web site supplements the book by providing a place to post new recipes, including those written in additional languages like Perl, Java, and Python. Monthly prizes will reward the best recipes submitted by readers. Secure Programming Cookbook for C and C++ is destined to become an essential part of any developer's...
  • №268
  • 1,34 МБ
  • добавлен
  • изменен
Washington: DC, 1990. — 363 p. This manual presents the basic principles and techniques of cryptanalysts and their relation to cryptography. Cryptography concerns the various ways of protecting messages from being understood by anyone except those for whom the messages are intended. Cryptographers are the people who create and use codes and ciphers. Cryptanalytics is the art...
  • №269
  • 8,90 МБ
  • добавлен
  • изменен
University of Texas, 2003. — 338 p. In this book the author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible and of interest to many others. Preliminaries Coding and Information Theory Introduction to...
  • №270
  • 1,18 МБ
  • добавлен
  • изменен
Second Edition. — San Francisco: Morgan Kaufmann Publishers, 2002. — 427 p. — (The Morgan Kaufmann Series in Software Engineering and Programming). — ISBN: 978-1-55860-769-9. Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and...
  • №271
  • 18,92 МБ
  • добавлен
  • изменен
Third Edition. — San Francisco: Morgan Kaufmann Publishers, 2009. — 435 p. — ISBN-13: 978-0123744791. A volume in The Morgan Kaufmann Series in Software Engineering and Programming. Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and...
  • №272
  • 4,77 МБ
  • добавлен
  • изменен
BoBoCoAe, 2015. — 163 p. — ISBN: 8740301265, 9788740301267 In this book, one of data security methods known as visual cryptography (VC) is presented. Specifically, visual cryptography allows effective and efficient secret sharing between a number of trusted parties. As with many cryptographic schemes, trust is the most difficult part. Visual cryptography provides a very...
  • №273
  • 10,47 МБ
  • добавлен
  • изменен
Morgan Kaufmann, 2004, 166 pp. For a long time, there has been a need for a practical, down-to-earth developers book for the Java Cryptography Extension. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the...
  • №274
  • 965,37 КБ
  • добавлен
  • изменен
Apress, 2005. — 504 p. — ISBN 978-1-4302-0026-0. This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the latest...
  • №275
  • 1,89 МБ
  • добавлен
  • изменен
Apress, 2001. - 432 p. — ISBN 1-59059-502-5. Cryptography in C and C++ mainly focuses on the practical aspects involved in implementing public key cryptography methods, such as the RSA algorithm that was recently released from patent protection. It also gives both a technical overview and an implementation of the Rijndael algorithm that was selected as the Advanced Encryption...
  • №276
  • 3,47 МБ
  • добавлен
  • изменен
2nd Edition. — Apress, 2005. — 432 p. — ISBN 1-59059-502-5. This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of additional material as well as numerous improvements to the original text. The chapter about random number generation has been completely rewritten, and the...
  • №277
  • 3,57 МБ
  • добавлен
  • изменен
Oxford University Press, 1998. — 268 p. — ISBN: 0198532881. This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a...
  • №278
  • 1,71 МБ
  • добавлен
  • изменен
John Wiley & Sons, 2007. — 557 p. — ISBN-13: 978-0-470-06064-3. Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms),...
  • №279
  • 4,70 МБ
  • добавлен
  • изменен
Bonanza Book, 1989. — 259 p. — ISBN: 051765704X. Perfect for word lovers and puzzlers, this comprehensive, illustrated volume includes Indian sign language, Morse code, Jefferson's cipher wheel and more, presented in an informative and historical manner. Advances in cryptology were definitely hindered by its close association with mysticism. In the presence of the expansion of...
  • №280
  • 2,10 МБ
  • добавлен
  • изменен
Диссертация, Princeton University, 2001, -282 pp. The digital information revolution has brought about profound changes in our society and our lives. The many advantages of digital information have also generated new challenges and new opportunities for innovation. This thesis discusses the issues regarding multimedia data hiding and its application to multimedia security and...
  • №281
  • 2,61 МБ
  • добавлен
  • изменен
John Wiley/Higher Education Press, 2013. — 433 p. — ISBN: 1118188586 The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these...
  • №282
  • 1,95 МБ
  • добавлен
  • изменен
John Wiley/Higher Education Press, 2013. — 433 p. — ISBN: 1118188586. The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two...
  • №283
  • 3,28 МБ
  • добавлен
  • изменен
Springer, 2008. — 213 p. — ISBN 978-1-4419-7721-2. The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems,...
  • №284
  • 1,85 МБ
  • добавлен
  • изменен
New York: Springer, 2008. — 213 p. — ISBN 978-1-4419-7721-2. The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three...
  • №285
  • 3,50 МБ
  • добавлен
  • изменен
New York: Springer, 2008. — 270 p. — ISBN-13 978-0-387-48741-0. The book is about the cryptanalytic attacks on RSA. RSA is the first workable and practical public-key cryptographic system, invented in 1977 and published in 1978, by Rivest, Shamir and Adleman, then all at the Massachusetts Institute of Technology (MIT), and is still the most widely used cryptographic systems in...
  • №286
  • 2,86 МБ
  • дата добавления неизвестна
  • изменен
New York: Springer, 2008. — 270 p. — ISBN-13 978-0-387-48741-0. The book is about the cryptanalytic attacks on RSA. RSA is the first workable and practical public-key cryptographic system, invented in 1977 and published in 1978, by Rivest, Shamir and Adleman, then all at the Massachusetts Institute of Technology (MIT), and is still the most widely used cryptographic systems in...
  • №287
  • 2,41 МБ
  • добавлен
  • изменен
Springer, 2014. — 136 p. This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with...
  • №288
  • 2,00 МБ
  • добавлен
  • изменен
Pearson Education, 2006. — 897 p. — ISBN-13: 978-0-32126-333-9. Security is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into...
  • №289
  • 25,15 МБ
  • добавлен
  • изменен
Syngress, 2016. — 432 p. — ISBN 978-0-12-812006-4. Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding....
  • №290
  • 9,99 МБ
  • добавлен
  • изменен
München: Oldenbourg Verlag, 2013. — 135 p. This book presents the benefits of the synergetic effect of the combination of coding and cryptography. It introduces new directions for the interoperability between the components of a communication system. Coding and cryptography are standard components in today's distributed systems. The integration of cryptography into coding...
  • №291
  • 5,86 МБ
  • добавлен
  • изменен
Солнечногорск: НИЯУ МИФИ, 2015. — 18 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Использование датчиков случайных чисел Модель нарушителя Сравнение существующих ДСЧ Предварительные условия для получения случайных данных Алгоритм измерения времени доступа к оперативной памяти Измерение времени исполнения инструкций (без кэш-памяти) Исключение...
  • №292
  • 772,81 КБ
  • добавлен
  • изменен
Ижевск : ФГБОУ ВО Ижевская ГСХА, 2016 -136 с. Излагаются теоретические основы и практические аспекты кодирования информации применительно к современным информационным технологиям. Подробно рассматриваются способы хранения и методы защиты электронных документов, программ и носителей информации от несанкционированного использования и компьютерных вирусов.
  • №293
  • 988,83 КБ
  • добавлен
  • изменен
Солнечногорск: КРИПТО-ПРО, 2015. — 25 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Безопасное хранение криптографических ключей Ключевые носители (токены) Функциональный ключевой носитель (ФКН) Защищенное соединение под защитой пароля
  • №294
  • 1,50 МБ
  • добавлен
  • изменен
Выходные данные неизвестны. — 20 с. Материалы к лекции по теме «Криптография в древние времена». Излагаемый материал входит в двухсеместровый курс “История криптографии”, читаемый в ИКСИ Академии ФСБ. Понятие "Безопасность" охватывает широкий круг интересов как отдельных лиц, так и целых государств. В наше мобильное время видное место отводится проблеме информированной...
  • №295
  • 268,28 КБ
  • добавлен
  • изменен
Солнечногорск: НИУ ВШЭ, 2015. — 33 с. Научно-практическая конференция «РусКрипто’2015» В настоящее время теоретико-автоматный подход к анализу и синтезу шифров стал естественным и обычным направлением криптоанализа. Многие вопросы эквивалентности ключей шифров формулируются в форме неотличимости состояний выбранных автоматов. В докладе сообщается о полученной достижимой...
  • №296
  • 207,30 КБ
  • добавлен
  • изменен
Учебное пособие. — М.: Гелиос АРВ, 2006. — 376 с. — ISBN 5-85438-149-4. Посвящено алгоритмам блочного шифрования: принципам их построения и анализа. Рассматриваются действующие стандарты, а также многие другие общеизвестные криптографические алгоритмы, в том числе и финалисты конкурса AES. Излагаются способы проведения атак на эти алгоритмы с помощью таких методов, как линейный и...
  • №297
  • 4,17 МБ
  • добавлен
  • изменен
Учебное пособие. — М.: Гелиос АРВ, 2006. — 376 с. Посвящено алгоритмам блочного шифрования: принципам их построения и анализа. Рассматриваются действующие стандарты, а также многие другие общеизвестные криптографические алгоритмы, в том числе и финалисты конкурса AES. Излагаются способы проведения атак на эти алгоритмы с помощью таких методов, как линейный и дифференциальный...
  • №298
  • 105,30 МБ
  • добавлен
  • изменен
ГОСТ 16600-72. Передача речи по трактам радиотелефонной связи. Требования к разборчивости речи и методы артикуляционных измерений [Звукозапись] / ГОСТ 16600-72 ; исп.: Д.И. Библев. – Белгород. : НИУ БелГУ, 2016. – 1380 сек. – Режим доступа: https://www.researchgate.net/publication/312167036_Recording_Gost_16600-72 DOI: 10.13140/RG.2.2.33677.74720 File Info: File type: wav...
  • №299
  • 120,22 МБ
  • добавлен
  • изменен
Учебное пособие. — М.: Горячая Линия — Телеком, 2006. — 78 с. В систематизированном виде рассмотрены вопросы создания симметричных и асимметричных криптографических систем защиты информации. Описаны алгоритмы электронных цифровых подписей, системы управления криптографическими ключами, имитозащита информации. Для широкого круга читателей, интересующихся вопросами защиты...
  • №300
  • 12,60 МБ
  • добавлен
  • изменен
Учебное пособие. — М.: Горячая Линия — Телеком, 2006. — 152 с. Книга отсканирована и содержит на одном листе 2 страницы. Интересная книга по основам криптографии. В первой главе рассказывается история криптографии, основные понятия и определения, требования к криптосистемам, а также краткие сведения о криптоанализе. Далее рассматриваются традиционные симметричные и...
  • №301
  • 443,30 КБ
  • дата добавления неизвестна
  • изменен
М.: Национальный Открытый Университет "ИНТУИТ", 2016. — 283 с. (2-е изд.) В курсе лекций изложены основные подходы, методы и алгоритмы современной криптографии. Рекомендуется для студентов, начинающих изучение основ информационной безопасности, а также для всех интересующихся вопросами защиты информации. В курсе сформулированы основные понятия современной криптографии....
  • №302
  • 25,10 МБ
  • добавлен
  • изменен
Пер. с англ. - М.: Мир, 2007. - 550 с.: ил., 16 с. цв. ил. Книга представляет собой вводный курс в криптологию, основанный на лекциях автора в Мюнхенском технологическом институте и материалах семинара по методам криптоанализа. Первая часть посвящена классической области криптографии. Подробно описываются шифры замены и перестановочные шифры - основные кирпичики симметричных...
  • №303
  • 46,97 МБ
  • добавлен
  • изменен
Киев: Політехника, 2017. – 272 с. Исследованы свойства нового класса эллиптических кривых в форме Эдвардса, которые полезны для решения задач асимметричной криптографии. Обоснована новая классификация кривых в обобщенной форме Эдвардса над конечным полем нечетной характеристики с разбиением их на три непересекающихся класса в зависимости от свойств квадратичности их параметров a и...
  • №304
  • 3,33 МБ
  • добавлен
  • изменен
М.: КомКнига, 2006. — 280 с. — ISBN 5-484-00444-6. Настоящая книга содержит описание и сравнительный анализ алгоритмов на эллиптических кривых. Изучаются протоколы эллиптической криптографии, имеющие аналоги — протоколы на основе алгебраических свойств мультипликативной группы конечного поля и протоколы, для которых таких аналогов нет — протоколы, основанные на спаривании Вейля и...
  • №305
  • 24,98 МБ
  • добавлен
  • изменен
М.: КомКнига, 2006. — 280 с. — ISBN 5-484-00444-6. Настоящая книга содержит описание и сравнительный анализ алгоритмов на эллиптических кривых. Изучаются протоколы эллиптической криптографии, имеющие аналоги — протоколы на основе алгебраических свойств мультипликативной группы конечного поля и протоколы, для которых таких аналогов нет — протоколы, основанные на спаривании Вейля...
  • №306
  • 12,38 МБ
  • добавлен
  • изменен
М.: МЭИ, 2000. — 100 с. Учебное пособие посвящено перспективному направлению криптографии с открытым ключом - криптографии эллиптических кривых. В нем отражен опыт работы научного семинара, работавшего в 1998/99 учебном году в МЭИ под руководством А.А.Болотова, и исследовавшего вопросы эффективной реализации операций в конечных полях и группах точек эллиптических кривых для...
  • №307
  • 694,70 КБ
  • добавлен
  • изменен
Москва: Вильямс, 2004. — 499 с. — Книга содержит описание и анализ основных алгоритмов, на которых создаются криптографические системы эллиптической криптографии, алгебраическую теорию построения таких алгоритмов и анализ их сложности. Предназначена для студентов, преподавателей вузов испециалистов, создающих программные комплексы защиты информации на основе теории эллиптических...
  • №308
  • 2,52 МБ
  • дата добавления неизвестна
  • изменен
Москва: КомКнига, 2006. — 328 с. — ISBN: 5-484-00443-8 Настоящая книга посвящена перспективному направлению в области защиты информации, математическую основу которого составляет теория эллиптических кривых. Книга содержит необходимые для изучения эллиптической криптографии сведения по теории конечного поля и базовые понятия теории эллиптических кривых. В ней излагаются...
  • №309
  • 14,61 МБ
  • дата добавления неизвестна
  • изменен
Учеб. пособие. М.: РУДН, 2008. – 218 с. В учебном пособии представлены основные понятия криптографии и ее методы обеспечения безопасности информации. Приводятся и сравниваются современные отечественные и зарубежные криптографические стандарты. Основное внимание уделяется применению достижений криптографии для решения прикладных задач. Учебное пособие входит в серию пособий по...
  • №310
  • 2,09 МБ
  • добавлен
  • изменен
Учеб. пособие. — Москва: Триумф, 2004. — 443 с. — ISBN: 5-89392-083 Данная книга содержит математическую теорию новейших криптографических алгоритмов и рассчитана в большей степени на программистов - практиков. В данной книге вы найдёте описание особенностей эффективной реализации криптографических алгоритмов на языках С и С++, а также большое количество хорошо документированных...
  • №311
  • 38,95 МБ
  • добавлен
  • изменен
Учеб. пособие. — Москва: Триумф, 2004. — 443 с. — ISBN: 5-89392-083 Здесь вы найдёте описание особенностей эффективной реализации криптографических алгоритмов на языках Си и С++. Приложены практические примеры криптосистемы RSA. Несмотря на то, что настоящее издание содержит математическую теорию новейших криптографических алгоритмов, книга в большей степени рассчитана на...
  • №312
  • 19,81 МБ
  • дата добавления неизвестна
  • изменен
М.:НИУ ВШЭ, 2014. — 163 с. Оглавление Необратимые и односторонние функции Определения Генераторы псевдослучайных чисел Псевдослучайные функции Шифрование с закрытым ключом Одноразовые схемы Многоразовые схемы Шифрование с открытым ключом Протоколы привязки к биту (bit commitment) Интерактивные протоколы привязки Протоколы бросания монетки Неразглашение...
  • №313
  • 762,15 КБ
  • добавлен
  • изменен
М.: Физматлит, 2009. — 208 с. На рубеже 1990-2000-х годов развернулось изучение универсального феномена - динамического (детерминированного) хаоса, что стимулировало разработку его источников и поиск сфер его применения. Таковыми оказались информационные технологии, в частности информационная безопасность. Монография обобщает результаты полидисциплинарных исследований,...
  • №314
  • 10,43 МБ
  • добавлен
  • изменен
Воронеж : Издательско-полиграфический центр Воронежского государственного университета, 2011. — 136 с. Учебное пособие подготовлено на кафедре технической кибернетики и автоматического регулирования факультета прикладной математики, информатики и механики Воронежского государственного университета. Рекомендуется для студентов 4-го курса дневного отделения, 4-го курса вечернего...
  • №315
  • 1,77 МБ
  • добавлен
  • изменен
Учебное пособие. — Воронеж: ВГУ, 2008. — 88 с. Учебное пособие подготовлено на кафедре технической кибернетики и автоматического регулирования факультета прикладной математики, информатики и механики Воронежского государственного университета. Рекомендуется для студентов 4-го курса дневного отделения и 4-го курса вечернего отделения специальности 010501 - "Прикладная...
  • №316
  • 820,39 КБ
  • добавлен
  • изменен
Учебное пособие. — Воронеж: ВГУ, 2008. — 96 с. Учебное пособие подготовлено на кафедре технической кибернетики и автоматического регулирования факультета прикладной математики, информатики и механики Воронежского государственного университета. Рекомендуется для студентов 4-го курса дневного отделения и 4-го курса вечернего отделения специальности 010501 - "Прикладная...
  • №317
  • 915,15 КБ
  • дата добавления неизвестна
  • изменен
М.: МФТИ, 2011. — 225 с. — ISBN 5-7417-0377-9. Краткое содержание Основные понятия и определения Классические шифры Блоковые шифры Потоковые шифры Криптографические хэш-функции Криптосистемы с открытым ключом Распространение ключей Распределение секретов Примеры систем защиты Аутентификация пользователя Программные уязвимости Математическое приложение
  • №318
  • 1,92 МБ
  • добавлен
  • изменен
М.: МФТИ, 2017. — 364 с. В настоящем пособии рассмотрены только основные математические методы защиты информации, и среди них основной акцент сделан на криптографическую защиту, которая включает симметричные и несимметричные методы шифрования, формирование секретных ключей, протоколы ограничения доступа и аутентификации сообщений и пользователей. Кроме того, в пособии...
  • №319
  • 9,91 МБ
  • добавлен
  • изменен
Учебное пособие. - СПб.: НИУ ИТМО, 2012. - 142 с. В учебном пособии изложены и проанализированы основные понятия криптографической защиты информации, как в Российской Федерации, так и за рубежом. Рассмотрены понятия блочных шифров, поточных шифров, истории развития криптографии и системы с открытым ключом. Рекомендовано студентам, аспирантам и специалистам по специальностям:...
  • №320
  • 1,93 МБ
  • добавлен
  • изменен
СПб.: Лань, 2015. — 176 с. — (Учебники для вузов. Специальная литература). — ISBN 9785811418558. Учебное пособие содержит минимально необходимые сведения по общей теории обыкновенных представлений и характеров групп, по теории представлений и характеров симметрических групп подстановок, а также о некоторых подходах в применениях теории представлений групп к решению...
  • №321
  • 1,44 МБ
  • добавлен
  • изменен
Москва: Алгоритм, 2017. — 480 с. — ISBN 978-5-906979-79-7. Криптология - наука, занимающаяся методами шифрования и дешифрования. Одна из старейших наук, которая зародилась несколько тысяч лет назад и продолжает активно развиваться сейчас. В книге подробно рассказано об истории зарождения и эволюции криптологии и специальной ("закрытой") связи в Советском Союзе и современной...
  • №322
  • 10,88 МБ
  • добавлен
  • изменен
Самиздат, 2019. — 160 с. — ISBN 978-5-5321-0646-8. В отличие от криптографии, которая шифрует содержимое секретного сообщения, стеганография скрывает сам факт его существования. При этом ее можно совмещать с методами криптологии, усложняя в целом систему защиты информации. Книга рассказывает историю рождения и эволюции стеганографии в мире, разработки и усложнения методов и...
  • №323
  • 2,29 МБ
  • добавлен
  • изменен
Самара: ПГАТИ, 2006. — 51 с. Рассматриваются криптографические алгоритмы, криптографические протоколы, политика безопасности, оценивание риска. Для студентов, обучающихся по специальности «Защищенные системы связи». Содержание: Криптографические алгоритмы . Алгоритм DES. Алгоритм RSA. Хэш-функции. Задачи. Криптографические протоколы . Классификация...
  • №324
  • 630,59 КБ
  • добавлен
  • изменен
Учебное пособие. — М.: Нолидж, 2001. – 552 с. — ISBN 5-89251-102-2 Издание второе, исправленное и дополненное. Пособие посвящено вопросам программной реализации различных методов защиты информации. Основное внимание при изложении материала уделено криптографическим механизмам защиты. Во введение излагаются основные понятия, определения и алгоритмы, связанные с...
  • №325
  • 1,72 МБ
  • добавлен
  • изменен
Солнечногорск: БИФИТ, 2015. — 21 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Стандарт Trusted Execution Environment Архитектура Secure Element и ее реализация на платформе Java Card Secure Element и NFC Android HCE и его применение Samsung Knox как пример реализации доверенной среды –плюсы и минусы
  • №326
  • 1,03 МБ
  • добавлен
  • изменен
Учебник. Воронеж: Воронежский институт МВД России, 2008. - 240 с. Учебник содержит систематическое изложение всего материала по курсу "математические основы криптографии" и предназначен для выполнения типового расчёта, проведения практических занятий, лабораторных работ и самоподготовки для курсантов радиотехнического факультета.
  • №327
  • 1,11 МБ
  • добавлен
  • изменен
Москва: Манн, Иванов и Фербер, 2016. — 230 с.: 124 илл. — ISBN 978-5-00100-130-0. В истории любой науки (и не только науки) есть загадки, закодированные послания, скрытая от посторонних информация. В этой книге собрано множество захватывающих историй дешифровки, причем читатель с небольшой помощью автора, специалиста в области компьютерной безопасности, разгадает секретные...
  • №328
  • 3,70 МБ
  • добавлен
  • изменен
Москва: Манн, Иванов и Фербер, 2016. — 230 стр., 124 илл. — ISBN 978-5-00100-130-0. В истории любой науки (и не только науки) есть загадки, закодированные послания, скрытая от посторонних информация. В этой книге собрано множество захватывающих историй дешифровки, причем читатель с небольшой помощью автора, специалиста в области компьютерной безопасности, разгадает секретные...
  • №329
  • 3,75 МБ
  • добавлен
  • изменен
Москва: Манн, Иванов и Фербер, 2016. — 230 стр., 124 илл. — ISBN 978-5-00100-130-0. В истории любой науки (и не только науки) есть загадки, закодированные послания, скрытая от посторонних информация. В этой книге собрано множество захватывающих историй дешифровки, причем читатель с небольшой помощью автора, специалиста в области компьютерной безопасности, разгадает секретные...
  • №330
  • 2,71 МБ
  • добавлен
  • изменен
М.: ABF, 1996. —335 с. — ISBN 5-87484-054-0 Эта книга познакомит читателей с одним из величайших видов тайн — наукой о шифрах или криптологией. Изобретенная тысячелетия назад письменность обладает свойством вседоступности, которое, в зависимости от получателя сообщения, можно рассматривать как полезное, или как вредное. Мы обычно рады получить письмо от знакомых, но бываем не в...
  • №331
  • 288,66 КБ
  • дата добавления неизвестна
  • изменен
Солнечногорск: НовГУ, 2015. — 70 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Сравнительная стойкость криптоалгоритмов и сроки их действия The Machine Квантовый компьютер Этапы развития квантового компьютера Компьютеры D-Wave «Moore's Law» «Rose's law» Квантовые алгоритмы и криптография Задачи дискретного логарифмирования и факторизации...
  • №332
  • 2,76 МБ
  • добавлен
  • изменен
Курс лекций. — Воронеж: ВГУ. — 124 с. Содержание: Введение в теорию чисел Алгоритмы История криптографии Классическое шифрование Современные методы традиционного шифрования Криптосистемы без передачи ключей Криптосистемы с открытым ключом Алгоритм RSA Криптография с использованием эллиптических кривых Квантовая криптография Биометрические системы контроля доступа
  • №333
  • 6,66 МБ
  • добавлен
  • изменен
Учебное пособие. — СПб.: Военно-космическая академия имени А.Ф.Можайского, 1997. — 98 с. Приводятся основные требования к современной системе защиты ЭВМ. Как один из важнейших выделен принцип прозрачности, предполагающий шифрование в масштабе реального времени, совместимость с наибольшим числом прикладных и системных программ, а также автоматическое функционирование и...
  • №334
  • 545,36 КБ
  • добавлен
  • изменен
Учебное пособие. — СПб.: Военно-космическая академия имени А.Ф.Можайского, 1997. — 118 c. Излагаются общие принципы применения системы защиты «Кобра» для обеспечения безопасности обработки и хранения информации в компьютерных системах. Приводится классификация схем и уровней защиты, реализуемых системой. Рассматриваются основные способы разграничения доступа пользователей к...
  • №335
  • 619,42 КБ
  • добавлен
  • изменен
Учебное пособие. — М.: МИЭМ, 2005. — 207 с. — ISBN 5-94506-122-0 Посвящено решению проблем информационной безопасности современных информационных систем на основе криптографических методов. Дается изложение основных результатов криптографии от классических симметричных криптоалгоритмов до современных криптографических протоколов на основе криптографии с открытым ключом....
  • №336
  • 689,57 КБ
  • дата добавления неизвестна
  • изменен
Учебное пособие. — М.: МИЭМ, 2005. — 207 с. — ISBN 5-94506-122-0. Посвящено решению проблем информационной безопасности современных информационных систем на основе криптографических методов. Дается изложение основных результатов криптографии от классических симметричных криптоалгоритмов до современных криптографических протоколов на основе криптографии с открытым ключом....
  • №337
  • 4,98 МБ
  • добавлен
  • изменен
Автор и выходные данные неизвестны. — 212 с. Краткое содержание: Информационная безопасность компьютерных систем Основные угрозы безопасности АСОИ Принципы криптографической защиты информации Аппаратно-программные средства защиты компьютерной информации Шифры перестановки Шифры простой замены Шифрование методом гаммирования
  • №338
  • 3,75 МБ
  • добавлен
  • изменен
Электронное учебное пособие для студентов института вычислительной математики и информационных технологий / Ш.Т. Ишмухаметов, Р.Г. Рубцова. - Казань: Казанский федеральный университет, 2012. - 138 с. В электронном учебном пособии собран учебный материал, относящийся к основам построения современных алгоритмов криптографии и соответствующий вспомогательный материал, связанный с...
  • №339
  • 510,43 КБ
  • добавлен
  • изменен
Учебное пособие. — Красноярск: Сибирский федеральный университет, 2011. — 160 с. — ISBN 978-5-7638-2113-7 Излагаются некоторые элементы теории чисел, отношения сравнимости, модулярная арифметика, степенные вычеты, первообразные корни, индексы, алгоритмы дискретного логарифмирования, китайская теорема об остатках, простые числа и проверка на простоту, разложение чисел на множители...
  • №340
  • 1,86 МБ
  • добавлен
  • изменен
Солнечногорск: ISBC-НИИМЭ и Микрон, 2015. — 15 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Методы реализации существующих аппаратных СКЗИв России в форм-факторе USB-токенови смарт-карт Назначения изделия ESMART TokenГОСТ ESMART TokenГОСТ Опыт реализации проектов на базе микроконтроллера MIK51 с 2008 года Основные технические характеристики...
  • №341
  • 1,92 МБ
  • добавлен
  • изменен
Выходные данные неизвестны. — 83 с. Как следует из эпиграфа, проблема сохранения секретов волновала людей со времени появления секретов. Сенека до сих пор прав, и истина, «знают двое – знает свинья», как говаривал папаша Мюллер, всегда будет актуальна. Иллюстрацией этого в криптографии может служить наличие двух типов алгоритмов: симметричного и асимметричного. Первый, как это...
  • №342
  • 447,55 КБ
  • добавлен
  • изменен
Выходные данные неизвестны. — 78 с. Как следует из эпиграфа, проблема сохранения секретов волновала людей со времени появления секретов. Сенека до сих пор прав, и истина, «знают двое – знает свинья», как говаривал папаша Мюллер, всегда будет актуальна. Иллюстрацией этого в криптографии может служить наличие двух типов алгоритмов: симметричного и асимметричного. Первый, как это...
  • №343
  • 1,29 МБ
  • добавлен
  • изменен
Солнечногорск: Инсайд РУС, 2015. — 15 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Промышленная автоматизация сегодня Глобализация систем автоматизации Угрозы Как защитить SCADA? Средства ИБ и SCADA – конфликт интересов?
  • №344
  • 766,54 КБ
  • добавлен
  • изменен
Омск: ОГУ им. Ф.М. Достоевского, 2013. — 91 с. Представлены задачи и упражнения по базовым разделам криптографии. Предложены оригинальные задачи для более глубокого понимания теории. Содержит набор зашифрованных текстов для компьютерного расшифрования. Адресован студентам, магистрантам и аспирантам, впервые изучающим криптографию, а также преподавателям курсов криптографии и ее...
  • №345
  • 489,14 КБ
  • добавлен
  • изменен
Солнечногорск: РусКрипто, 2015. — 19 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Исследование свойств функции сжатия Как генерировать константы Исследование свойств конструкции хэш-функции в целом Исследование вопросов реализации
  • №346
  • 233,40 КБ
  • добавлен
  • изменен
М.: МГУ, 2007. — 185 с. К имеющемся лекциям, выложен электронный курс. Для студентов, аспирантов и специалистов, изучающих и практически использующих методологические и алгоритмические основы, стандарты, а также механизмы и сервисы безопасности компьютерных сетей. Курс лекций предполагает изучение методологических и алгоритмических основ и стандартов криптографической защиты...
  • №347
  • 1,88 МБ
  • добавлен
  • изменен
М.: Интуит, Бином. Лаборатория, 2007. — 608 c.: ил. — ISBN: 978-5-94774-650-1, 5-9556-0020-5, 978-5-9556-0102-1 (Электронная версия курса) К данному курсу, выложены дополнительно лекции. Курс предполагает изучение методологических и алгоритмических основ, стандартов, а также механизмов и сервисов безопасности компьютерных сетей. Рекомендовано УМО в области прикладной информатики...
  • №348
  • 2,22 МБ
  • добавлен
  • изменен
СПб.: СПбГУ, 2005. — Курс лекций читался при поддержке компании Интел. Основные темы, изучаемые в течение курса: криптографические протоколы, доказательства с нулевым разглашением, псевдослучайные генераторы, электронные выборы, электронные платежи, многосторонние секретные вычисления. Содержание: Основные протоколы: разделение секрета, привязка к биту, подбрасывание...
  • №349
  • 1,41 МБ
  • дата добавления неизвестна
  • изменен
Солнечногорск: Анкад, 2015. — 20 с. Научно-практическая конференция «РусКрипто’2015» Содержание: Международные исследования алгоритма Стрибог Структура алгоритма Стрибог Функция сжатия Стрибог Цель исследования статистических свойств выходной последовательности Статистическое исследование: Покер-тест
  • №350
  • 1,23 МБ
  • добавлен
  • изменен
М.: Вильямс, 2005. — 768 с. — ISBN 5-8459-0847-7 Wenbo Mao - Modern Cryptography: Theory and Practice Книга, написанная ведущим специалистом по компьютерной безопасности компании HP Венбо Мао, посвящена актуальным проблемам современной криптографии. Автор критикует "учебные" криптографические алгоритмы и описывает принципы разработки криптосистем и протоколов повышенной...
  • №351
  • 18,36 МБ
  • дата добавления неизвестна
  • изменен