Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively - so br...Savoir plus
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the ...Savoir plus
Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and ...Savoir plus
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the des...Savoir plus
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...Savoir plus
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Savoir plus
The opening section of this book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols. Essential tec...Savoir plus
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...Savoir plus
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...Savoir plus
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure ste...Savoir plus
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze-...Savoir plus
This volume provides a detailed account of block cipher analysis, design, and deployment. The authors describe the most prominent block ciphers and gi...Savoir plus
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Savoir plus
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic...Savoir plus
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security a...Savoir plus
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, counterme...Savoir plus
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applic...Savoir plus
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BL...Savoir plus
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use stron...Savoir plus
This book establishes, for the first time, the potential application of NC O implementations to cryptographic primitives such as one-way functions, ps...Savoir plus
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...Savoir plus
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security ...Savoir plus
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, counterme...Savoir plus
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. Th...Savoir plus