Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
This text is intended for a one-semester course in cryptography at the advanced undergraduate/Master's degree level. It is suitable for students from various STEM backgrounds, including engineering, mathematics, and computer science, and may also be attractive for researchers and professionals who want to learn the basics of cryptography. Advanced knowledge of computer science or mathematics (other than elementary programming skills) is not assumed. The book includes more material than can be covered in a single semester. The Preface provides a suggested outline for a single semester course, though instructors are encouraged to select their own topics to reflect their specific requirements and interests. Each chapter contains a set of carefully written exercises which prompts review of the material in the chapter and expands on the concepts. Throughout the book, problems are stated mathematically, then algorithms are devised to solve the problems. Students are tasked to write computer programs (in C++ or GAP) to implement the algorithms. The use of programming skills to solve practical problems adds extra value to the use of this text. This book combines mathematical theory with practical applications to computer information systems. The fundamental concepts of classical and modern cryptography are discussed in relation to probability theory, complexity theory, modern algebra, and number theory. An overarching theme is cyber security: security of the cryptosystems and the key generation and distribution protocols, and methods of cryptanalysis (i.e., code breaking). It contains chapters on probability theory, information theory and entropy, complexity theory, and the algebraic and number theoretic foundations of cryptography. The book then reviews symmetric key cryptosystems, and discusses one-way trap door functions and public key cryptosystems including RSA and ElGamal. It contains a chapter on digital signature schemes, including material on message authentication and forgeries, and chapters on key generation and distribution. It contains a chapter on elliptic curve cryptography, including new material on the relationship between singular curves, algebraic groups and Hopf algebras.
Number theory --- Ergodic theory. Information theory --- Mathematical control systems --- coderen --- getallenleer --- informatietheorie --- Cryptography. --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Criptografia
Choose an application
The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstra-Lenstra-Lovász lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.
Cryptography. --- Criptografia --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Escriptura secreta --- Escriptura --- Símbols --- Xifratge (Informàtica)
Choose an application
Xifratge (Informàtica) --- Criptografia --- Escriptura --- Símbols --- Escriptura secreta --- Protecció de dades --- Seguretat informàtica --- Signatures electròniques --- Generadors de nombres aleatoris --- Nombres primers --- Criptografia (Informàtica) --- Criptografia (Matemàtica) --- Criptologia --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Esteganografia --- Llenguatges xifrats --- Xifratge de dades (Informàtica) --- Cryptography. --- Data encryption (Computer science) --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers
Choose an application
Data protection --- Computer science --- Law and legislation. --- Mathematics. --- Computer mathematics --- Electronic data processing --- Mathematics --- Habeas data --- Privacy, Right of --- Xifratge (Informàtica) --- Protecció de dades --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Processament de dades --- Seguretat informàtica --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Criptografia (Informàtica) --- Criptografia (Matemàtica) --- Criptologia --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Esteganografia --- Llenguatges xifrats --- Xifratge de dades (Informàtica) --- Signatures electròniques --- Criptografia --- Generadors de nombres aleatoris --- Nombres primers --- Símbols
Choose an application
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more.
Coding theory --- Cryptography --- Codage --- Cryptographie --- Mathematics --- Mathématiques --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Mathématiques --- Mathematics. --- Coding theory. --- Codificació, Teoria de la. --- Criptografia --- Matemàtica. --- Escriptura secreta --- Escriptura xifrada --- Esteganografia --- Escriptura --- Simbolisme --- Símbols --- Xifratge (Informàtica) --- Xifres i claus --- Teoria de la codificació --- Dades --- Electrònica digital --- Informació, Teoria de la --- Màquines, Teoria de --- Senyal, Teoria del (Telecomunicació) --- Programació (Ordinadors) --- Compressió (Informàtica) --- Compressió (Telecomunicació) --- Teoria de la informació --- Compressió de dades (Telecomunicació) --- Compressió de dades (Informàtica)
Choose an application
This book critically investigates the role of data subject rights in countering information and power asymmetries online. It aims at dissecting 'data subject empowerment' in the information society through the lens of the right to erasure ('right to be forgotten') in Article 17 of the General Data Protection Regulation (GDPR). In doing so, it provides an extensive analysis of the interaction between the GDPR and the fundamental right to data protection in Article 8 of the Charter of Fundamental Rights of the EU (Charter), how data subject rights affect fair balancing of fundamental rights, and what the practical challenges are to effective data subject rights.
Data protection --- Privacy, Right of --- Law and legislation --- Right to be forgotten. --- European Parliament. --- Right to be forgotten --- Right to oblivion --- Disclosure of information --- Council of the European Union. --- Dret a l'oblit --- Protecció de dades --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Processament de dades --- Seguretat informàtica --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Identitat digital --- Dret de supressió --- Dret a la intimitat --- Informàtica i dret --- Parlament Europeu --- European Parliamentary Assembly --- European Assembly --- Europaisches Parlament --- Assemblée parlamentaire européenne --- Assemblea parlamentare europea --- Europees Parlement --- Europese Parlement --- Europa-Parlament --- Comunidades Europeas. --- Comunitats Europees. --- Parlement européen --- Europa. --- European Parliament --- Parlamento Europeo --- Assemblea Parlamentària Europea --- Right to erasure --- Online reputation management
Choose an application
Computational intelligence. --- Engineering --- Data processing. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Cibernètica --- Seguretat informàtica --- Protecció de dades --- Protecció de dades personals --- Protecció de la informació (Informàtica) --- Regulació de dades --- Processament de dades --- Xifratge (Informàtica) --- Delegats de protecció de dades --- Dret a l'oblit --- Identitat digital --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Pirates informàtics --- Automàtica --- Cervells electrònics --- Comunicació --- Electrònica --- Anàlisi de sistemes --- Biònica --- Control automàtic --- Ordinadors --- Robòtica --- Sistemes autoorganitzatius --- Sistemes de control biològic --- Teoria de la informació --- Xarxes neuronals (Informàtica)
Choose an application
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without sacrificing performance is nontrivial and this is the subject of this book. Part I deals with side-channel analysis and its relevance to fault attacks. The chapters in Part II cover fault analysis in secret key cryptography, with chapters on block ciphers, fault analysis of DES and AES, countermeasures for symmetric-key ciphers, and countermeasures against attacks on AES. Part III deals with fault analysis in public key cryptography, with chapters dedicated to classical RSA and RSA-CRT implementations, elliptic curve cryptosystems and countermeasures using fault detection, devices resilient to fault injection attacks, lattice-based fault attacks on signatures, and fault attacks on pairing-based cryptography. Part IV examines fault attacks on stream ciphers and how faults interact with countermeasures used to prevent power analysis attacks. Finally, Part V contains chapters that explain how fault attacks are implemented, with chapters on fault injection technologies for microprocessors, and fault injection and key retrieval experiments on a widely used evaluation board. This is the first book on this topic and will be of interest to researchers and practitioners engaged with cryptographic engineering.
Computer engineering. --- Computer science. --- Computers -- Access control. --- Data encryption (Computer science). --- Engineering & Applied Sciences --- Computer Science --- Data protection. --- Cryptography. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer hardware. --- Data structures (Computer science). --- Electrical engineering. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Computer Hardware. --- Electrical Engineering. --- Electronic data processing --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Computers --- Design and construction --- Electric engineering --- Engineering --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Criptografia. --- Avaries --- Localització. --- Errors de sistemes (Enginyeria) --- Enginyeria de sistemes --- Fiabilitat (Enginyeria) --- Escriptura secreta --- Escriptura xifrada --- Escriptura --- Simbolisme --- Símbols --- Xifratge (Informàtica) --- Xifres i claus --- Esteganografia
Choose an application
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores numerous connections between social network diffusion research and artificial intelligence through topics such as agent-based modeling, logic programming, game theory, learning, and data mining. The book also surveys key empirical results in social network diffusion, and reviews the classic and cutting-edge research with a focus on open problems.
Intel·ligència artificial --- Xifratge (Informàtica) --- Xarxes socials en línia --- Artificial intelligence. --- Data encryption (Computer science). --- Artificial Intelligence. --- Cryptology. --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Comunitats virtuals --- Xarxes socials per Internet --- Xarxes socials virtuals --- Xarxes socials (Internet) --- Mitjans de comunicació social --- Pàgines web --- Xarxes socials --- Dades --- Encriptació (Informàtica) --- Encriptació de dades (Informàtica) --- Criptografia --- Protecció de dades --- Seguretat informàtica --- Biònica --- Ciència cognitiva --- Informàtica --- Màquines, Teoria de --- Ordinadors neuronals --- Simulació, Mètodes de --- Sistemes autoorganitzatius --- Vida artificial
Choose an application
Human-robot interaction --- Human engineering --- Computer security --- HRI (Human-robot interaction) --- Robot-human interaction --- Interacció persona-ordinador --- Robòtica --- Seguretat informàtica --- Ergonomia --- Enginyeria humana --- Factors humans en enginyeria --- Biotecnologia --- Enginyeria industrial --- Psicologia aplicada --- Condicions de treball --- Factors humans en l'arquitectura --- Sistemes persona-màquina --- Benestar --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics --- Enginyeria robòtica --- Cibernètica --- Autòmats --- Robòtica en medicina --- Robots --- Robots industrials --- Automatització --- Teoria de màquines --- Comunicació home-ordinador --- Comunicació persona-màquina --- Comunicació persona-ordinador --- IPO --- Interacció home-ordinador --- Interacció persona-màquina --- Relacions home-ordinador --- Relacions persona-màquina --- Relacions persona-ordinador --- Interfícies d'usuari (Sistemes d'ordinadors) --- Usabilitat (Disseny de sistemes)
Listing 1 - 10 of 15 | << page >> |
Sort by
|