Tag Archives: cryptography

New title for Communication and Information Engineering

Algebraic curves in cryptography
By Ling,San.
QA268.L755a, Lee Wee Nam Library

Synopsis:
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. [As taken from Amazon][As taken from Amazon]

New title for Communication and Information Engineering

Network security essentials : applications and standards
By Stallings, William.
TK5105.59.S782n 2014, Lee Wee Nam Library

Synopsis:
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards, Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. [As taken from Syndetics

New title for Communication and Information Engineering

Title: Communication system security
Author: Chen, Lidong.
Call number: TK5102.85.C518
Availability: Click here

Synopsis:
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.

Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions.

Taking an evolutionary approach to security in today’s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios.

Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks. [As taken from Amazon]

New title for Communication and Information Engineering

Title: Information security : principles and practice
Author: Stamp, Mark
Call number: QA76.9.A25S783 2011
Availability: Click here

Synopsis:
This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic “orange book” view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. [As taken from Amazon]

New title for Communication and Information Engineering

Title: Algebraic curves and cryptography
Author: Murty, Vijaya Kumar
Call number: QA565.A394
Availability:    Click here

Synopsis:
This volume is based on seminars on algebraic curves and cryptography held at the GANITA Lab of the University of Toronto during 2001-2008. The articles are mostly suitable for independent study by graduate students who wish to enter the field, both in terms of introducing basic material as well as guiding them in the literature. The literature in cryptography seems to be growing at an exponential rate. [As taken from Amazon]