This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reversed by decryption which uses the same user-suppli
This textbook serves the needs of engineers and computer scientists responsible for designing, implementing, and verifying secure computer and information systems. Methods are based on the application
This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography—--the art of making secure building blo
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel secure deletion solutions targeting specific real-wo
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics whi
The development of electronic commerce and other applications on the Internet is held up by concerns about security. Cryptography - the science of codes and ciphers - will be a significant part of the
In this second edition, author Erickson uses practical examples to illustrate the most common computer security issues in three related fields: programming, networking, and cryptography. Readers can
Algebraic Cryptanalysis is a guide for advanced-level students and researchers/practitioners entering this new field. This text bridges the gap between a course in cryptography, and being able to rea
In cryptography, ciphers is the technical term for encryption and decryption algorithms. They are an important sub-family that features high speed and easy implementation and are an essential part of
NCO functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of cryptography in NCO attempts to construct cryptogr
This set of lectures provides a structured introduction to the concept of equidistribution in number theory. This concept is of growing importance in many areas, including cryptography, zeros of L-fun
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in
Software-based cryptography can be used for security applications where data traffic is not too large and low encryption rate is tolerable. But hardware methods are more suitable where speed and real-
The only guide for software developers who must learn and implement cryptography safely and cost effectively.The book begins with a chapter that introduces the subject of cryptography to the reader. T
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and sing
This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetri
This book presents methods to improve information security for protected communication. Interdisciplinary scientific-engineering concepts are combined and applied, including cryptography, chaos theory