Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the 8th International Conference on Applications and Techniques in Information Security, ATIS 2017, held in Auckland, New Zealand, in July 2017.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The author discusses quantum algorithms for solving the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP), and the Elliptic Curve Discrete Logarithm Problem (ECDLP) and for attacking IFP, DLP and ECDLP based cryptographic systems.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general.
Bemærk: Kan ikke leveres før jul.
This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book constitutes revised selected papers from the 7th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2016, held in Graz, Austria, in April 2016. side-channel analysis (case studies); fault analysis; and side-channel analysis (tools).
Bemærk: Kan ikke leveres før jul.
Covering topics in algebraic geometry, coding theory, and cryptography, this volume presents interdisciplinary... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings... Læs mere