This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identificatio...Lasīt vairāk
This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Lasīt vairāk
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Lasīt vairāk
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. The challenge is how to minimize computational costs and reduce interaction while maintaining prov...Lasīt vairāk
Unlocking the future of image and video coding with AI-based Image and Video Coding: Methods, Standards, and Applications, we can explore the revolutionary impact of deep learning technologies on image and video compression. This book is...Lasīt vairāk
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shors and Grovers) and state-of-the-art machine learning methods. By illustrating how these concepts apply to everyday engineering ch...Lasīt vairāk
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples...Lasīt vairāk
The textbook covers digital communication systems, in both theory and application. The authors present a complete, up-to-date coverage on the principles of digital communications. The book covers a broad range of topics in digital communications,...Lasīt vairāk
This textbook provides a comprehensive introduction to the fundamentals of Polar, LDPC and Turbo Codes. These codes have become essential cornerst...Lasīt vairāk
This book offers a deep dive into quantum teleportation and immune noise models, providing cutting-edge solutions to challenges in noisy quantum communication systems. It covers advanced theories and practical methods for building robust, high-fid...Lasīt vairāk
This book focuses on the sustainable security practices in the domain of blockchain, quantum, and post-quantum technologies dealing with the real-time applications. The topics discussed in this book include banking applications, protection of di...Lasīt vairāk
This book offers a design-centered approach to quantum teleportation as well as in-depth analysis of various quantum teleportation schemes. Quantum teleportation, a vital component of practical quantum communication technologies, serves as a secur...Lasīt vairāk
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Lasīt vairāk
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography....Lasīt vairāk
This textbook focuses on the basics and complex themes of group theory taught to senior undergraduate mathematics students across universities. The contents focus on the properties of groups, subgroups, cyclic groups, permutation groups, cosets an...Lasīt vairāk
This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing books on bent functions refer to just binary bent functions. The authors describe the differences between binary and multiple-valued ca...Lasīt vairāk