This book offers readers a succinct and reader-friendly foundation to the most important topics in the field of data compression. Complete and clear, it is the perfect reference for advanced undergraduates in computer science and requires a minimum of mathematics.
This book presents the challenges of designing hierarchical cryptographic key management algorithms to implement adaptive access control in dynamic environments and suggests solutions that will overcome these challenges.
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest.
Here is an extensive overview of practical and efficient modern techniques for design and implementation of secure computation and related protocols. Covers circuit optimization, hardware-assisted garbled circuit protocols and modular design of SFE protocols.
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, countermeasures against AES, attack-resistent devices, fault attacks on stream ciphers and fault injection experiments.
This form of public key encryption has been the subject of intense research in recent years. Summarizing the literature on IBE, this volume covers ideas that could spark further research as well as background on subjects such as elliptic curves and pairings.