After an introduction to cryptography and data security, the authors of this book explain the main techniques in modern cryptography. The book is uniquely designed for students of engineering and applied computer science, and engineering practitioners.
Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitioners with backgrounds in physics, mathematics, cryptography, coding theory and processor theory.
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.
Digital Video Protection describes the key aspects of content protection and DRM systems, demystifying the technology and techniques. The text covers the rationale for protecting digital video content, video piracy, watermarking, and more.
This account of an effective methodology for defining and verifying security protocols in network communication includes an accompanying tool set that will be of great interest to researchers and advanced professionals working on critical security protocols.