Algebraic curves in cryptography By Ling,San. QA268.L755a, Lee Wee Nam Library Synopsis: The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. [As taken from Amazon][As taken from Amazon] |
Tag Archives: cryptography
New title for Communication and Information Engineering
Network security essentials : applications and standards By Stallings, William. TK5105.59.S782n 2014, Lee Wee Nam Library Synopsis: |
New title for Communication and Information Engineering
|
Synopsis:
Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in security design.
Divided into four parts, the book begins with the necessary background on practical cryptography primitives. This part describes pseudorandom sequence generators, stream and block ciphers, hash functions, and public-key cryptographic algorithms. The second part covers security infrastructure support and the main subroutine designs for establishing protected communications. The authors illustrate design principles through network security protocols, including transport layer security (TLS), Internet security protocols (IPsec), the secure shell (SSH), and cellular solutions.
Taking an evolutionary approach to security in today’s telecommunication networks, the third part discusses general access authentication protocols, the protocols used for UMTS/LTE, the protocols specified in IETF, and the wireless-specific protection mechanisms for the air link of UMTS/LTE and IEEE 802.11. It also covers key establishment and authentication in broadcast and multicast scenarios.
Moving on to system security, the last part introduces the principles and practice of a trusted platform for communication devices. The authors detail physical-layer security as well as spread-spectrum techniques for anti-jamming attacks. [As taken from Amazon]
New title for Communication and Information Engineering
|
Synopsis:
This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic “orange book” view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. [As taken from Amazon]
New title for Communication and Information Engineering
|
Synopsis:
This volume is based on seminars on algebraic curves and cryptography held at the GANITA Lab of the University of Toronto during 2001-2008. The articles are mostly suitable for independent study by graduate students who wish to enter the field, both in terms of introducing basic material as well as guiding them in the literature. The literature in cryptography seems to be growing at an exponential rate. [As taken from Amazon]