Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Primality Testing and Integer Factorization in Public-Key Cryptography

Posted By: AvaxGenius
Primality Testing and Integer Factorization in Public-Key Cryptography

Primality Testing and Integer Factorization in Public-Key Cryptography by Song Y. Yan
English | PDF (True) | 2009 | 386 Pages | ISBN : 0387772677 | 5.3 MB

The Primality Testing Problem (PTP) has now proved to be solvable in deterministic polynomial-time (P) by the AKS (Agrawal-Kayal-Saxena) algorithm, whereas the Integer Factorization Problem (IFP) still remains unsolvable in (P). There is still no polynomial-time algorithm for IFP. Many practical public-key cryptosystems and protocols such as RSA (Rivest-Shamir-Adleman) rely their security on computational intractability of IFP.

Introduction to Cryptography: Principles and Applications

Posted By: AvaxGenius
Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications by Hans Delfs , Helmut Knebl
English | PDF | 2007 | 371 Pages | ISBN : 3642080405 | 3.5 MB

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

A Classical Introduction to Cryptography: Applications for Communications Security

Posted By: AvaxGenius
A Classical Introduction to Cryptography: Applications for Communications Security

A Classical Introduction to Cryptography: Applications for Communications Security by Serge Vaudenay
English | PDF (True) | 2006 | 344 Pages | ISBN : 0387254641 | 2.3 MB

A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.

Progress in Cryptology – Mycrypt 2005 (Repost)

Posted By: AvaxGenius
Progress in Cryptology – Mycrypt 2005 (Repost)

Progress in Cryptology – Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings by Ed Dawson, Serge Vaudenay
English | PDF (True) | 2005 | 338 Pages | ISBN : 3540289380 | 4.3 MB

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28-30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005.

Advances in Cryptology – EUROCRYPT 2005 (Repost)

Posted By: AvaxGenius
Advances in Cryptology – EUROCRYPT 2005 (Repost)

Advances in Cryptology – EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings by Ronald Cramer
English | PDF (True) | 2005 | 589 Pages | ISBN : 3540259104 | 5.1 MB

These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research.

Multimedia Data Hiding

Posted By: AvaxGenius
Multimedia Data Hiding

Multimedia Data Hiding by Min Wu , Bede Liu
English | PDF (True) | 2003 | 228 Pages | ISBN : 0387954260 | 21.7 MB

The digital information revolution has brought about profound changes in our society and our life. New devices and powerful software have made it possible for consumers worldwide to create, manipulate, share, and enjoy the multimedia information. Internet and wireless networks offer ubiquitous channels to deliver and to exchange multimedia information for such pur­ poses as remote collaboration, distant learning, and entertainment. With all these advances in multimedia coding and communication technologies over the past decade, the major hurdle for allowing much broader access of multimedia assets and deployment of multimedia services no longer lies with bandwidth-related issues, but with how to make sure that content is used for its intended purpose by its intended recipients. The core issue then be­ comes the development of secure management of content usage and delivery across communication networks. Data hiding and digital watermarking are promising new technologies for multimedia information protection and rights management. Secondary data can be embedded imperceptibly in digital multimedia signals for a variety of applications, including ownership protection, authentication, access con­ trol, and annotation. Data hiding can also be used to send side information in multimedia communication for providing additional functionalities or for enhancing performance. The extraction of the embedded data mayor may not need knowledge of the original host media data. In addition to im­ perceptibility, robustness against moderate processing such as compression is also an important consideration.

Fundamentals of Computer Security

Posted By: AvaxGenius
Fundamentals of Computer Security

Fundamentals of Computer Security by Josef Pieprzyk , Thomas Hardjono , Jennifer Seberry
English | PDF | 2003 | 686 Pages | ISBN : 3540431012 | 3.9 MB

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.

Data Privacy and Security

Posted By: AvaxGenius
Data Privacy and Security

Data Privacy and Security by David Salomon
English | PDF (True) | 2003 | 461 Pages | ISBN : 0387003118 | 48.1 MB

Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various methods, techniques, and algorithms. Moreover, there are numerous helpful examples to reinforce the reader's understanding and expertise with these techniques and methodologies.

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Posted By: AvaxGenius
Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint

Computer Intrusion Detection and Network Monitoring: A Statistical Viewpoint by David J. Marchette
English | PDF | 2001 | 339 Pages | ISBN : 0387952810 | 29 MB

In the fall of 1999, I was asked to teach a course on computer intrusion detection for the Department of Mathematical Sciences of The Johns Hopkins University. That course was the genesis of this book. I had been working in the field for several years at the Naval Surface Warfare Center, in Dahlgren, Virginia, under the auspices of the SHADOW program, with some funding by the Office of Naval Research. In designing the class, I was concerned both with giving an overview of the basic problems in computer security, and with providing information that was of interest to a department of mathematicians. Thus, the focus of the course was to be more on methods for modeling and detecting intrusions rather than one on how to secure one's computer against intrusions. The first task was to find a book from which to teach. I was familiar with several books on the subject, but they were all at either a high level, focusing more on the political and policy aspects of the problem, or were written for security analysts, with little to interest a mathematician. I wanted to cover material that would appeal to the faculty members of the department, some of whom ended up sitting in on the course, as well as providing some interesting problems for students. None of the books on the market at the time had an adequate discussion of mathematical issues related to intrusion detection.

Coding Theory, Cryptography and Related Areas

Posted By: AvaxGenius
Coding Theory, Cryptography and Related Areas

Coding Theory, Cryptography and Related Areas: Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998 by Johannes Buchmann, Tom Høholdt, Henning Stichtenoth, Horacio Tapia-Recillas
English | PDF (True) | 2000 | 269 Pages | ISBN : 3540662480 | 22.5 MB

This book contains 23 contributions presented at the "International Conference on Coding Theory, Cryptography and Related Areas (ICCC)", held in Guanajuato, Mexico, in April 1998.

Topics in Cryptology – CT-RSA 2008

Posted By: step778
Topics in Cryptology – CT-RSA 2008

Tal Malkin, "Topics in Cryptology – CT-RSA 2008"
English | 2008 | pages: 446 | ISBN: 3540792627 | PDF | 8,3 mb

Public Key Infrastructures, Services and Applications (Repost)

Posted By: step778
Public Key Infrastructures, Services and Applications (Repost)

Sabrina De Capitani di Vimercati, Chris Mitchell, "Public Key Infrastructures, Services and Applications"
English | 2013 | pages: 203 | ISBN: 3642400116 | PDF | 4,0 mb

Privacy, Security and Trust within the Context of Pervasive Computing (Repost)

Posted By: AvaxGenius
Privacy, Security and Trust within the Context of Pervasive Computing (Repost)

Privacy, Security and Trust within the Context of Pervasive Computing by Philip Robinson, Harald Vogt, Waleed Wagealla
English | PDF | 2005 | 167 Pages | ISBN : 0387234616 | 9 MB

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria.The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces between mechanisms in different technical and social problem spaces. An investigation of the interfaces between the notions of context, privacy, security, and trust will result in a deeper understanding of the "atomic" problems, leading to a more complete understanding of the social and technical issues in pervasive computing.

Information Security and Cryptology

Posted By: AvaxGenius
Information Security and Cryptology

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II by Chunpeng Ge, Moti Yung
English | PDF (True) | 2024 | 426 Pages | ISBN : 981970944X | 24 MB

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections:

Introduction to Cryptography: Principles and Applications

Posted By: AvaxGenius
Introduction to Cryptography: Principles and Applications

Introduction to Cryptography: Principles and Applications by Hans Delfs , Helmut Knebl
English | PDF | 2002 | 315 Pages | ISBN : N/A | 40.8 MB

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.