5955cf4ac75e5.jpeg
PDF
Cryptography: An Introduction, 3rd Edition

Nigel Smart's "Cryptography" provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.

595488afe20be.jpg
PDF
CompTIA Security+ All-in-One Exam Guide

Get complete coverage of all objectives included on the latest release of the CompTIA Security+ exam from this comprehensive resource. Cowritten by leading information security experts, this authoritative guide fully addresses the skills required for securing a network and managing risk. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help yo...

59536b0eb1769.jpg
PDF
Soil and Water Conservation Merit Badge Series

Merit Badge Pamphlets: An official Boy Scout merit badge pamphlet has been created for the BSA by topic authorities for each merit badge. The pamphlets contain requirements, introductory information and supplemental reference text. A scout can purchase pamphlets from BSA, find them in a troop library, or often-times check them out from a public library. There is also a Requirements Booklet with a merit badge list for quick reference....

59536b0ccc8f6.jpg
PDF
Complexity and Cryptography

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes. Understanding the principles on which it is based is an important topic that requires a knowledge of both computational complexity and a range of topics in pure mathematics.

5950ca7cda925.jpeg
PDF
Kryptologie

Dieses Lehrbuch bietet einen fundierten Überblick über manche klassische hin zu modernen bis zu brandaktuellen kryptografischen Verfahren. Die Voraussetzungen, die ein Leser mitbringen sollte, konzentrieren sich auf wenige Inhalte der linearen Algebra und Analysis, die im ersten Studienjahr vermittelt werden. Das Buch umfasst im Wesentlichen einen Themenkreis, der in einer vierstündigen Vorlesung angesprochen werden kann. Es zeichnet...

5950ca7acf51a.jpg
PDF
Foundations of Cryptography Volume II Basic Applications

Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the first volume, this second volume of Foundations of Cryptography contains a rigorous and systematic treatment of three basic applications: Encryption, Signatures, and General Cryptograph...

002fd8f0_medium
PDF
Cryptography Engineering: Design Principles & Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll le...

41h-Y6QzAeL._SY291_BO1,204,203,200_QL40_
PDF
Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not ...

0037c4af_medium
PDF
Number Theoretic Methods in Cryptography: Complexity lower bounds

The book introduces new techniques which imply rigorous lower bounds on the complexity of some number theoretic and cryptographic problems. These methods and techniques are based on bounds of character sums and numbers of solutions of some polynomial equations over finite fields and residue rings. It also contains a number of open problems and proposals for further research. We obtain several lower bounds, exponential in terms of log...

31saZPGIZPL._SX218_BO1,204,203,200_QL40_
PDF
Handbook of Applied Cryptography

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially i...