This book provides a comprehensive introduction to blockchain and distributed ledger technology (DLT). Intended as an applied guide for hands-on practitioners, this book includes detailed examples and...Lasīt vairāk
Feistel networks are one of the easiest ways to build pseudorandom permutations. Thanks to this property, many secret key algorithms (symmetric ciphers) have been designed as Feistel networks, and it is possible to design many others. The most fam...Lasīt vairāk
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. The challenge is how to minimize computational costs and reduce interaction while maintaining prov...Lasīt vairāk
This book guides readers from the foundations of quantum mechanics through advanced quantum algorithms (such as Shors and Grovers) and state-of-the-art machine learning methods. By illustrating how these concepts apply to everyday engineering ch...Lasīt vairāk
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the desired security properties, Tamarin either verifies the protocol or provides counter examples...Lasīt vairāk
The textbook covers digital communication systems, in both theory and application. The authors present a complete, up-to-date coverage on the principles of digital communications. The book covers a broad range of topics in digital communications,...Lasīt vairāk
This textbook provides a comprehensive introduction to the fundamentals of Polar, LDPC and Turbo Codes. These codes have become essential cornerst...Lasīt vairāk
This book offers a deep dive into quantum teleportation and immune noise models, providing cutting-edge solutions to challenges in noisy quantum communication systems. It covers advanced theories and practical methods for building robust, high-fid...Lasīt vairāk
This book offers a design-centered approach to quantum teleportation as well as in-depth analysis of various quantum teleportation schemes. Quantum teleportation, a vital component of practical quantum communication technologies, serves as a secur...Lasīt vairāk
Lattice-based cryptography is a promising post-quantum cryptographic approach that can withstand potential attacks from future quantum computers. This book will introduce the theoretical mathematics that underpins lattice-based cryptography, such as...Lasīt vairāk
This handbook is a selection of foundational aspects, security analysis, platforms, and applications of blockchains that consists of four parts. The first part introduces the basic building blocks such as distributed computing and cryptography....Lasīt vairāk
This textbook focuses on the basics and complex themes of group theory taught to senior undergraduate mathematics students across universities. The contents focus on the properties of groups, subgroups, cyclic groups, permutation groups, cosets an...Lasīt vairāk
This book discusses in a uniform way binary, ternary, and quaternary bent functions, while most of the existing books on bent functions refer to just binary bent functions. The authors describe the differences between binary and multiple-valued ca...Lasīt vairāk
The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames. However, in the quantum computing era, cryptographic methods must b...Lasīt vairāk
This book presents the experimental development of an information-powered engine inspired by the famous thought experiment, Maxwells demon, to understand its potential to produce energy for practical purposes. The development of an engine based o...Lasīt vairāk
Software engineering has changed: A software project today is likely to use large language models (LLMs) for some tasks and will employ some open-source software. It is therefore important to integrate open source and use of LLMs in teaching soft...Lasīt vairāk
This project was motivated by the upcoming fiftieth anniversary of the IFIP Human Choice and Computers (HCC) conference, the event that led to IFIPs Technical Committee 9 (TC 9). Although IFIP committees are mainly technical, TC 9 is dedicated to...Lasīt vairāk
This book provides a comprehensive guide to the design and analysis of quantum secure communication schemes. While quantum computers may provide a platform for arithmetic calculations which threaten classical cryptosystems, the development of quan...Lasīt vairāk
This proceedings book gathers selected, peer-reviewed papers presented at the Fifth Scientific Days of the Doctoral School of Mathematics and Computer Sciences - S2DSMCS, held from December 2022, 2023, at Cheikh Anta Diop University in Dakar, Sen...Lasīt vairāk