Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
116 result(s) for "Cryptographie."
Sort by:
Quantum Computing
Quantum mechanics, the subfield of physics that describes the behavior of very small (quantum) particles, provides the basis for a new paradigm of computing. First proposed in the 1980s as a way to improve computational modeling of quantum systems, the field of quantum computing has recently garnered significant attention due to progress in building small-scale devices. However, significant technical advances will be required before a large-scale, practical quantum computer can be achieved. Quantum Computing: Progress and Prospects provides an introduction to the field, including the unique characteristics and constraints of the technology, and assesses the feasibility and implications of creating a functional quantum computer capable of addressing real-world problems. This report considers hardware and software requirements, quantum algorithms, drivers of advances in quantum computing and quantum devices, benchmarks associated with relevant use cases, the time and resources required, and how to assess the probability of success.
Hands-On Cryptography with Python
Cryptography is essential to protect sensitive information, but it is often performed inadequately or incorrectly. This book will show how to encrypt, evaluate, compare, and attack your data using Python. Overall, the book will help you deal with the common errors in encryption and would know how to exploit them.
Applied Cryptography for Researchers and Practitioners
The book will introduce readers to the broader concept of cryptography and its allied areas. Introduction to various cryptographic protocols such as symmetric and asymmetric encryption algorithms are provided in this book. New techniques such as blockchain and lightweight cryptography are also discussed in this book. The book additionally focuses on the musical cryptography concept and many new algorithms to secure communication are shown to be achieved using Indian music. Integer factorization is also discussed in this book with a plausible algorithm to break it in polynomial time. The book should be found useful to advanced undergraduate and post-graduate students, researchers and practitioners of computing science.
Asymmetric cryptography : primitives and protocols
\"Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed by concrete instantiations of public-key encryption and signatures; these led to an entirely new field of research with formal definitions and security models. Since then, impressive tools have been developed with seemingly magical properties, including those that exploit the rich structure of pairings on elliptic curves. Asymmetric Cryptography starts by presenting encryption and signatures, the basic primitives in public-key cryptography. It goes on to explain the notion of provable security, which formally defines what \"secure\" means in terms of a cryptographic scheme. A selection of famous families of protocols are then described, including zero-knowledge proofs, multi-party computation and key exchange. After a general introduction to pairing-based cryptography, this book presents advanced cryptographic schemes for confidentiality and authentication with additional properties such as anonymous signatures and multi-recipient encryption schemes. Finally, it details the more recent topic of verifiable computation.\"-- Page 4 of cover.
Cryptomonnaie. La comptabilité des Masternodes
Au cours des dernières années, le monde des cryptomonnaies a vu son lexique, déjà bien fourni, s'enrichir de trois nouveaux termes : Stacking, Proof of Stack et Masternode. Si ces expressions ne vous parlent pas ou peu, il est important de les comprendre pour saisir le changement intervenu dans le monde des cryptomonnaies et leur enjeu économique. Détails. Pas de chiffres.
Codename Nemo : the hunt for a Nazi U-boat and the elusive Enigma machine
On June 4, 1944, the course of World War II was forever changed. That day, a US Navy task force achieved the impossible--capturing German U-boat U-505. Called Operation Nemo, it was the first seizure of an enemy ship in battle since the War of 1812, one of the greatest achievements of the US Navy and a victory that shortened the duration of the war.
Learning and Experiencing Cryptography with CrypTool and SageMath
This book provides a broad overview of cryptography and enables cryptography for trying out. It emphasizes the connections between theory and practice, focuses on RSA for introducing number theory and PKI, and links the theory to the most current recommendations from NIST and BSI. The book also enables readers to directly try out the results with existing tools available as open source. It is different from all existing books because it shows very concretely how to execute many procedures with different tools. The target group could be self-learners, pupils and students, but also developers and users in companies. All code written with these open-source tools is available. The appendix describes in detail how to use these tools. The main chapters are independent from one another. At the end of most chapters, you will find references and web links. The sections have been enriched with many footnotes. Within the footnotes you can see where the described functions can be called and tried within the different CrypTool versions, within SageMath or within OpenSSL.