Listing 1 - 10 of 1755 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
Proposed 35 years ago, quantum cryptography (QC) and its most prominent part quantum key distribution (QKD) attracts more and more attention. Significant progress has been made in both its theory and practice from many points of view. The present book has four exclusive chapters. All chapters are focused on QC and QKD applications in advanced telecommunication networks: classical fiber optic lines with a constant increase in the range of quantum communication channels and duration of the connection; software-defined optical networks; free-space optical communication systems; and systems with elements of holographic processing. The book will be useful for researchers, engineers, and doctoral students working in areas of QC, QKD, and related areas of information security.
Choose an application
This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.
Choose an application
Despite being 2000 years old, cryptography is still a very active field of research. New needs and application fields, like privacy, the Internet of Things (IoT), physically unclonable functions (PUFs), post-quantum cryptography, and quantum key distribution, will keep fueling the work in this field. This book discusses quantum cryptography, lightweight cryptography for IoT, PUFs, cryptanalysis, and more. It provides a snapshot of some recent research results in the field, providing readers with some useful tools and stimulating new ideas and applications for future investigation.
Choose an application
In the new era of technology and advanced communications, coding theory and cryptography play a particularly significant role with a huge amount of research being done in both areas. This book presents some of that research, authored by prominent experts in the field.The book contains articles from a variety of topics most of which are from coding theory. Such topics include codes over order domains, Groebner representation of linear codes, Griesmer codes, optical orthogonal codes, lattices and theta functions related to codes, Goppa codes and Tschirnhausen modules, s-extremal codes, automorph
Choose an application
In the modern era of digitization, cryptographic techniques are becoming increasingly important. This book provides a comprehensive overview of lightweight cryptographic techniques for software-defined networks in the Internet of Things (IoT), cryptosystems, and the Internet of Multimedia Things (IoMT). It includes seven chapters that address such topics as image and video encryption, cybersecurity threat management, distinguishing encrypted from non-encrypted data, and more.
Choose an application
Choose an application
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew out of many courses presented by the authors over the past twenty years at various universities and covers a wide range of topics in mathematical cryptography. It is primarily geared towards graduate students and advanced undergraduates in mathematics and computer science, but may also be of interest to researchers in the area. Besides the classical methods of symmetric and private key encryption, the book treats the mathematics of cryptographic protocols and several unique topics such as Group-Based Cryptography Gröbner Basis Methods in Cryptography Lattice-Based Cryptography
Coding theory --- Cryptography --- Textbooks.
Choose an application
Listing 1 - 10 of 1755 | << page >> |
Sort by
|