Télécharger le livre :  Fault-Tolerant Distributed Consensus in Synchronous Networks
Ajouter à ma liste d'envies
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the problem by Lamport et al in 1982, the problem has been widely studied, both in cryptography as well as distributed...

Editeur : Springer
Parution : 2025-03-24
Collection : Information Security and Cryptography
PDF

116,04
Télécharger le livre :  The Complete Guide to SCION
Ajouter à ma liste d'envies
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point communication. In the five years since the publication of SCION: A Secure Internet Architecture, this...

Editeur : Springer
Parution : 2022-05-16
Collection : Information Security and Cryptography
PDF

94,94
Télécharger le livre :  Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity
Ajouter à ma liste d'envies
There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard...

Editeur : Springer
Parution : 2021-04-30
Collection : Information Security and Cryptography
PDF, ePub

94,94
Télécharger le livre :  The Design of Rijndael
Ajouter à ma liste d'envies
This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security, and principled design made it the Advanced Encryption Standard (AES), now the most widely applied data encryption technology.The authors developed the Rijndael algorithm...

Editeur : Springer
Parution : 2020-05-23
Collection : Information Security and Cryptography
PDF

168,79
Télécharger le livre :  Modelling and Verification of Secure Exams
Ajouter à ma liste d'envies
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management...

Editeur : Springer
Parution : 2018-03-19
Collection : Information Security and Cryptography
PDF

52,74
Télécharger le livre :  Secure Data Deletion
Ajouter à ma liste d'envies
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-world environments where secure deletion is problematic: mobile storage...

Editeur : Springer
Parution : 2016-11-02
Collection : Information Security and Cryptography
PDF

126,59
Télécharger le livre :  Cryptography in Constant Parallel Time
Ajouter à ma liste d'envies
Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this...

Editeur : Springer
Parution : 2013-12-19
Collection : Information Security and Cryptography
ePub

52,74
Télécharger le livre :  Practical Signcryption
Ajouter à ma liste d'envies
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not...

Editeur : Springer
Parution : 2010-11-11
Collection : Information Security and Cryptography
ePub

94,94
Télécharger le livre :  Towards Hardware-Intrinsic Security
Ajouter à ma liste d'envies
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required...

Editeur : Springer
Parution : 2010-11-03
Collection : Information Security and Cryptography
ePub

147,69
Télécharger le livre :  Efficient Secure Two-Party Protocols
Ajouter à ma liste d'envies
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. The computation should be such that the outputs received by the parties are correctly distributed, and...

Editeur : Springer
Parution : 2010-11-02
Collection : Information Security and Cryptography
PDF

168,79
Télécharger le livre :  Concurrent Zero-Knowledge
Ajouter à ma liste d'envies
Feuilleter
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze- knowledge proofs are convincing and yet yield nothing beyond the validity of the assertion being proved. Their...

Editeur : Springer
Parution : 2007-05-16
Collection : Information Security and Cryptography
PDF

94,94