Cryptography Based

Cryptography Fundamentals for Java and .NET Developers [repost]  eBooks & eLearning

Posted by ParRus at Dec. 5, 2016
Cryptography Fundamentals for Java and .NET Developers [repost]

Cryptography Fundamentals for Java and .NET Developers
WEBRip | English | MP4 | 1024 x 768 | AVC ~104 kbps | 14.979 fps
AAC | 115 Kbps | 44.1 KHz | 2 channels | 4h 14mn | 548 MB
Genre: Video Tutorial

Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted.

Pairing-Based Cryptography - Pairing 2008  

Posted by alt_f4 at Oct. 3, 2015
Pairing-Based Cryptography - Pairing 2008

Pairing-Based Cryptography - Pairing 2008: Second International Conference, Egham, UK, September 1-3, 2008, Proceedings (Lecture Notes in Computer Science) by Steven Galbraith
English | Oct. 10, 2008 | ISBN: 3540855033 | 385 Pages | PDF | 4 MB

This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008.

Why Cryptography Should Not Rely on Physical Attack Complexity  

Posted by Underaglassmoon at Sept. 5, 2015
Why Cryptography Should Not Rely on Physical Attack Complexity

Why Cryptography Should Not Rely on Physical Attack Complexity
Springer | Computer Science | October 4, 2015 | ISBN-10: 981287786X | 122 pages | pdf | 3.9 mb

by Juliane Krämer (Author)
Presents two practical physical attacks, the complexity of which has been overestimated and the implied security threats of which have been underestimated
Demonstrates that the assessment of physical attack complexity is error-prone and cryptography should not rely on it
Demonstrates how attackers can reveal the secret key of cryptographic algorithms based on these physical attacks
Primality Testing and Integer Factorization in Public-Key Cryptography

Primality Testing and Integer Factorization in Public-Key Cryptography (Advances in Information Security) by Song Y. Yan
English | Dec 2, 2008 | ISBN: 0387772677 | 371 Pages | PDF | 4 MB

Intended for advanced level students in computer science and mathematics, this key text, now in a brand new edition, provides a survey of recent progress in primality testing and integer factorization, with implications for factoring based public key cryptography. For this updated and revised edition, notable new features include a comparison of the Rabin-Miller probabilistic test in RP, the Atkin-Morain elliptic curve test in ZPP and the AKS deterministic test.

Cryptography and Communications - Volume 7 - Issue 2 - June 2015  

Posted by Underaglassmoon at Feb. 24, 2015
Cryptography and Communications - Volume 7 - Issue 2 - June 2015

Cryptography and Communications - Volume 7 - Issue 2 - June 2015
Springer | Coding, Information Theory, Data Structures, Cryptology | March 2015 | ISSN: 1936-2447 | 80 pages | pdf | 1.71 mb

Cryptography and Communications Discrete Structures, Boolean Functions and Sequences (CCDS) publishes high-quality papers discussing cryptography, error correcting codes, communications and their interactions. The journal provides a forum for the research communities of these domains, and covers all the fundamental and computational aspects of these fields.

Cryptography and Communications - Volume 7 - Issue 1 - March 2015  

Posted by Underaglassmoon at Feb. 24, 2015
Cryptography and Communications - Volume 7 - Issue 1 - March 2015

Cryptography and Communications - Volume 7 - Issue 1 - March 2015
Springer | Coding, Information Theory, Data Structures, Cryptology | March 2015 | ISSN: 1936-2447 | 205 pages | pdf | 8.80 mb

Cryptography and Communications Discrete Structures, Boolean Functions and Sequences (CCDS) publishes high-quality papers discussing cryptography, error correcting codes, communications and their interactions. The journal provides a forum for the research communities of these domains, and covers all the fundamental and computational aspects of these fields.

Group-based Cryptography [Repost]  

Posted by ChrisRedfield at Jan. 27, 2015
Group-based Cryptography [Repost]

Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov - Group-based CryptographyAlexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov - Group-based Cryptography
Published: 2008-08-27 | ISBN: 3764388269 | PDF | 183 pages | 1 MB

QC-LDPC Code-Based Cryptography [Repost]  

Posted by ChrisRedfield at Sept. 13, 2014
QC-LDPC Code-Based Cryptography [Repost]

Marco Baldi - QC-LDPC Code-Based Cryptography
Published: 2014-05-31 | ISBN: 3319025554 | PDF | 120 pages | 3 MB

Identity-Based Cryptography  

Posted by ChrisRedfield at Aug. 17, 2014
Identity-Based Cryptography

Marc Joye, ‎Gregory Neven - Identity-Based Cryptography
Published: 2008-12-15 | ISBN: 1586039474 | PDF | 272 pages | 5 MB

QC-LDPC Code-Based Cryptography  

Posted by nebulae at June 16, 2014
QC-LDPC Code-Based Cryptography

Marco Baldi, "QC-LDPC Code-Based Cryptography"
English | ISBN: 3319025554 | 2014 | 138 pages | PDF | 3 MB