Narrow your search

Library

EhB (6)

UCLL (5)

ULB (5)

KU Leuven (4)

Odisee (4)

Thomas More Kempen (4)

Thomas More Mechelen (4)

ULiège (4)

VIVES (4)

LUCA School of Arts (2)

More...

Resource type

book (6)


Language

English (6)


Year
From To Submit

2010 (1)

2009 (1)

2008 (3)

2006 (1)

Listing 1 - 6 of 6
Sort by

Book
Elementary Number Theory, Cryptography and Codes
Authors: --- --- ---
ISBN: 9783540692003 9783540691990 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

In this volume one finds basic techniques from algebra and number theory (e.g. congruences, unique factorization domains, finite fields, quadratic residues, primality tests, continued fractions, etc.) which in recent years have proven to be extremely useful for applications to cryptography and coding theory. Both cryptography and codes have crucial applications in our daily lives, and they are described here, while the complexity problems that arise in implementing the related numerical algorithms are also taken into due account. Cryptography has been developed in great detail, both in its classical and more recent aspects. In particular public key cryptography is extensively discussed, the use of algebraic geometry, specifically of elliptic curves over finite fields, is illustrated, and a final chapter is devoted to quantum cryptography, which is the new frontier of the field. Coding theory is not discussed in full; however a chapter, sufficient for a good introduction to the subject, has been devoted to linear codes. Each chapter ends with several complements and with an extensive list of exercises, the solutions to most of which are included in the last chapter. Though the book contains advanced material, such as cryptography on elliptic curves, Goppa codes using algebraic curves over finite fields, and the recent AKS polynomial primality test, the authors' objective has been to keep the exposition as self-contained and elementary as possible. Therefore the book will be useful to students and researchers, both in theoretical (e.g. mathematicians) and in applied sciences (e.g. physicists, engineers, computer scientists, etc.) seeking a friendly introduction to the important subjects treated here. The book will also be useful for teachers who intend to give courses on these topics.


Book
Cryptographic engineering.
Author:
ISBN: 9780387718170 9780387718163 Year: 2008 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.


Book
Codes: An Introduction to Information Communication and Cryptography
Author:
ISBN: 9781848002739 1848002726 9781848002722 9786611954901 128195490X 1848002734 Year: 2008 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle it, for example, mobile phones, digital cameras, and personal computers. This book is an integrated introduction to the mathematics of coding, that is, replacing information expressed in symbols, such as a natural language or a sequence of bits, by another message using (possibly) different symbols. There are three main reasons for doing this: economy, reliability, and security, and each is covered in detail. Only a modest mathematical background is assumed, the mathematical theory being introduced at a level that enables the basic problems to be stated carefully, but without unnecessary abstraction. Other features include: clear and careful exposition of fundamental concepts, including optimal coding, data compression, and public-key cryptography; concise but complete proofs of results; coverage of recent advances of practical interest, for example in encryption standards, authentication schemes, and elliptic curve cryptography; numerous examples and exercises, and a full solutions manual available to lecturers from www.springer.com This modern introduction to all aspects of coding is suitable for advanced undergraduate or postgraduate courses in mathematics, computer science, electrical engineering, or informatics. It is also useful for researchers and practitioners in related areas of science, engineering and economics.

Keywords

Mathematics. --- Combinatorics. --- Coding and Information Theory. --- Communications Engineering, Networks. --- Number Theory. --- Information and Communication, Circuits. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Coding theory. --- Number theory. --- Telecommunication. --- Mathématiques --- Structures de données (Informatique) --- Codage --- Théorie des nombres --- Télécommunications --- Cryptography --- Cryptography. --- Coding theory --- Mathematics --- Physical Sciences & Mathematics --- Algebra --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer science. --- Information theory. --- Electrical engineering. --- Computer Science. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Math --- Science --- Number study --- Numbers, Theory of --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Combinatorics --- Mathematical analysis --- Electric engineering --- Engineering --- Communication theory --- Cybernetics


Book
An introduction to mathematical cryptography
Authors: --- ---
ISBN: 9780387779935 9780387779942 0387779930 9786611954215 1281954217 0387779949 Year: 2008 Publisher: New York (N.Y.): Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: * classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; * fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; * an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.

Keywords

Computer science --- Cryptography --- Cryptographie --- Mathematics. --- Mathématiques --- Mathematics --- Coding theory. --- Cryptography --Mathematics. --- Coding theory --- Education --- Social Sciences --- Physical Sciences & Mathematics --- Algebra --- Book Studies & Arts --- Signs and symbols. --- Mathématiques --- EPUB-LIV-FT LIVMATHE LIVSTATI SPRINGER-B --- Representation, Symbolic --- Semeiotics --- Signs --- Symbolic representation --- Symbols --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Data structures (Computer science). --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Information theory. --- Number theory. --- Number Theory. --- Coding and Information Theory. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Information and Communication, Circuits. --- Order, Lattices, Ordered Algebraic Structures. --- Abbreviations --- Omens --- Semiotics --- Sign language --- Symbolism --- Visual communication --- Signs and symbols --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Mathematical analysis --- Math --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Number study --- Numbers, Theory of --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Communication theory --- Communication --- Cybernetics --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Cryptography - Mathematics


Book
Understanding cryptography : a textbook for students and practitioners
Authors: ---
ISBN: 9783642041013 9783642041006 3642041000 3642041019 3642446493 9786613563170 1280385251 Year: 2010 Publisher: Heidelberg ; New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Keywords

Computer Science. --- Data Structures, Cryptology and Information Theory. --- Circuits and Systems. --- Systems and Data Security. --- Computer science. --- Data protection. --- Data structures (Computer science). --- Systems engineering. --- Informatique --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Ingénierie des systèmes --- Cryptography. --- Cryptography --- Data encryption (Computer science) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematics. --- Cryptography -- Mathematics. --- Data encryption (Computer science). --- Electronic books. -- local. --- Book Studies & Arts --- Computer Science --- Engineering & Applied Sciences --- Education --- Social Sciences --- Mathematics --- Computer programming. --- Computer security. --- Electrical engineering. --- Electronic circuits. --- Programming Techniques. --- Communications Engineering, Networks. --- Data structures (Computer scienc. --- Telecommunication. --- Data Structures and Information Theory. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Electric engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Programming

A Classical Introduction to Cryptography Exercise Book
Authors: --- --- --- ---
ISBN: 9780387279343 9780387288352 0387279342 038728835X 9786610969425 1280969423 Year: 2006 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.

Keywords

Computer security --- Cryptography --- 681.3*E1 --- 681.3*E3 --- 681.3*E4 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E1 Data structures: arrays; graphs; lists; tables; trees --- Data structures: arrays; graphs; lists; tables; trees --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Protection --- Security measures --- Computer security. --- Cryptography. --- Sécurité informatique --- Cryptographie --- Problems, exercises, etc. --- Problèmes et exercices --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Data encryption (Computer science). --- Information theory. --- Computer Communication Networks. --- Data structures (Computer science) --- Coding theory. --- Data transmission systems. --- Cryptology. --- Theory of Computation. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Input/Output and Data Communications. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data communication systems --- Transmission of data --- Digital communications --- Electronic systems --- Information theory --- Telecommunication systems --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computers. --- Computer communication systems. --- Data structures (Computer science). --- Input-output equipment (Computers). --- Computer hardware --- Computer I/O equipment --- Electronic analog computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Calculators --- Cyberspace --- Input-output equipment --- Distributed processing

Listing 1 - 6 of 6
Sort by