Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardization, implementation, and research.This practical textbook/guide is intended for academic courses in...Lasīt vairāk
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture,...Lasīt vairāk
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a...Lasīt vairāk
There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was...Lasīt vairāk
There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was...Lasīt vairāk
Hash functions are the cryptographers Swiss Army knife. Even though they play an integral part in todays cryptography, existing textbooks discuss hash functions only in passing and instead often put an emphasis on other primitives like encryption s...Lasīt vairāk
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively - so bringing precise meaning to the intuition that certain information leaks are small enough to be tolera...Lasīt vairāk
(Izdošanas datums: 23-May-2020, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662607695)
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology.The authors developed the...Lasīt vairāk
This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a...Lasīt vairāk
(Izdošanas datums: 06-Nov-2019, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662581469)
This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requiremen...Lasīt vairāk
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and con...Lasīt vairāk
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security and high availability. Among its core features, SCION also provides route control, explicit trust inf...Lasīt vairāk
This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomor...Lasīt vairāk
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problema...Lasīt vairāk
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "e;secure"e; is as important as creating something that achieves that goal, and security definitions...Lasīt vairāk
(Izdošanas datums: 29-Sep-2015, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662479742)
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification...Lasīt vairāk
(Izdošanas datums: 19-Dec-2014, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662447574)
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAK...Lasīt vairāk
(Izdošanas datums: 19-Dec-2013, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642173677)
Locally computable (NC0) functions are "e;simple"e; functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic...Lasīt vairāk
(Izdošanas datums: 09-Mar-2013, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662047224)
Rijndael was the surprise winner of the contest for the new Advanced En- cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be- ginning in January 1997; Rijn...Lasīt vairāk
(Izdošanas datums: 09-Mar-2013, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783662095270)
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, while the properties and vulnerabilities of different protocols can vary greatly.This is the...Lasīt vairāk
(Izdošanas datums: 06-Dec-2012, PDF+DRM, Izdevniecība: Springer Berlin Heidelberg, ISBN-13: 9783642871269)
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and p...Lasīt vairāk
(Izdošanas datums: 30-Oct-2012, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783540786368)
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptogra...Lasīt vairāk
(Izdošanas datums: 21-Jun-2012, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642296567)
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an ar...Lasīt vairāk
(Izdošanas datums: 25-Oct-2011, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642173424)
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-supplied key. Block ciphers are fundamental to modern cr...Lasīt vairāk
(Izdošanas datums: 11-Nov-2010, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783540894117)
In todays world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality - the recipient of a message should be able to ascertain who sent the message, be sure that...Lasīt vairāk
(Izdošanas datums: 03-Nov-2010, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642144523)
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storag...Lasīt vairāk
(Izdošanas datums: 02-Nov-2010, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642143588)
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen...Lasīt vairāk
(Izdošanas datums: 02-Nov-2010, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642143038)
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly dis...Lasīt vairāk
(Izdošanas datums: 09-Aug-2010, PDF+DRM, Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG, ISBN-13: 9783642143137)
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph f...Lasīt vairāk