This book covers advanced topics in Discrete Mathematics and its applications to day-to-day problems in several areas. It is intended for graduate students of Computer Science, Mathematics and Enginee
Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the
This text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication.Beginning with classical ciphers and their cryptanalysis, this book proceeds to f
This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation, Communication, and Cryptography, TQC 2012, held in Tokyo, Japan, in May 2012.The 12 papers prese
This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volu
This book constitutes the proceedings of the 11th International Conference on Security and Cryptography for Networks, SCN 2018, held in Amalfi, Italy, in September 2018.The 30 papers presented in this
Towards a Quarter-Century of Public Key Cryptography brings together in one place important contributions and up-to-date research results in this fast moving area. Towards a Quarter-Century of Public
Covering classical cryptography, modern cryptography, and steganography, this volume details how data can be kept secure and private. Each topic is presented and explained by describing various method
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading o
Java Cryptography teaches you how to write secure programs using Java's cryptographic tools. It thoroughly discusses the java.security package and the Java Cryptography Extensions (JCE), showing you
Oppliger, who works for the Federal Authorities of the Swiss Confederation and teaches at the U. of Zurich, Switzerland, provides students and practitioners such as computer scientists, electrical eng
Every e-mail message, every online purchase, and every cell phone call gets encrypted at one end of its journey and decrypted at the other. Now an everyday application, "crypto" is part of the job des