Category Archives: Cryptography

Handbook of FPGA Design Security

The purpose of Handbook of FPGA Design Security is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, … Continue reading

Posted in Cryptography, Format, Networking, Security & Encryption, Systems Analysis & Design, pdf | Leave a comment

Open Source Software for Digital Forensics

Open Source Applications Springer Book Series Editor: Ernesto Damiani, University of Milan, Italy http://sesar.dti.unimi.it/ossbook/ Open Source Software for Digital Forensics is the first book dedicated to the use of FLOSS (Free Libre Open Source Software) in computer forensics. It presents … Continue reading

Posted in Cryptography, Format, Languages & Tools, Networking, Programming Languages, Security & Encryption, Software Design & Engineering, Software Development, pdf | Leave a comment

Permutation Complexity in Dynamical Systems: Ordinal Patterns, Permutation Entropy and All That (Springer Series in Synergetics)

The study of permutation complexity can be envisioned as a new kind of symbolic dynamics whose basic blocks are ordinal patterns, that is, permutations defined by the order relations among points in the orbits of dynamical systems. Since its inception … Continue reading

Posted in Cryptography, Format, Mathematical Physics, Physics, Security & Encryption, pdf | Leave a comment

Topics in Cryptology – CT-RSA 2010: The 10th Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2010, CT-RSA 2010, held in San Francisco, CA, USA in April 2010. The 25 revised full papers presented together with 1 invited lecture were carefully reviewed … Continue reading

Posted in Cryptography, Format, Networking, Security & Encryption, pdf | Leave a comment

Progress in Cryptology – AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings … Computer Science / Security and Cryptology)

This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from … Continue reading

Posted in Cryptography, Format, Networking, Operating Systems, Security & Encryption, pdf | Leave a comment

Replication: Theory and Practice (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues)

Replication is a topic of interest in the distributed computing, distributed systems, and database communities. Although these communities have traditionally looked at replication from different viewpoints and with different goals (e.g., performance versus fault tolerance), recent developments have led to … Continue reading

Posted in Algorithms, Cryptography, Database Storage & Design, Format, Security & Encryption, pdf | Leave a comment

Advances in Cryptology – CRYPTO 2009: 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009, Proceedings (Lecture … Computer Science / Security and Cryptology)

This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009. The 38 revised full papers presented were carefully reviewed and selected from 213 submissions. Addressing all … Continue reading

Posted in Algebra & Trigonometry, Cryptography, Format, Information Theory, Mathematics, Networking, Security & Encryption, pdf | Leave a comment

Forensics in Telecommunications, Information and Multimedia: Second International Conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009, … and Telecommunications Engineering)

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Forensics in Telecommunications, Information and Multimendia, e-Forensics 2009, held in Adelaide, Australia, in January 2009. The focus of this year’s conference has shifted to the legal … Continue reading

Posted in Artificial Intelligence, Computer Science, Cryptography, Digital Law, Format, Law, Network Security, Privacy, Security & Encryption, pdf | Leave a comment

Military Cryptanalysis – Part I: Monoalphabetic Substitution Systems

Military Cryptanalysis – Part I: Monoalphabetic Substitution Systems is one of the most well-respected publications on cryptanalysis, as was written by William F. Friedman, one of the true experts in the field. Now declassified by the National Security Agency (NSA), … Continue reading

Posted in Cryptography, Format, Security & Encryption, pdf | Leave a comment

Algebraic Geometry in Coding Theory and Cryptography

This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion … Continue reading

Posted in Computer Science, Cryptography, Earth Sciences, Format, Geometry, Information Theory, Mathematics, Regional, Security & Encryption, pdf | Leave a comment