This book offers readers a succinct and reader-friendly foundation to the most important topics in the field of data compression. Complete and clear, it is the perfect reference for advanced undergraduates in computer science and requires a minimum of mathematics.
This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.
Sebastian Pape discusses two different scenarios for authentication. On the one hand, users cannot trust their devices and nevertheless want to be able to do secure authentication. On the other hand, ...
This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis ...
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.
Here is an extensive overview of practical and efficient modern techniques for design and implementation of secure computation and related protocols. Covers circuit optimization, hardware-assisted garbled circuit protocols and modular design of SFE protocols.
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.