Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Gestion des cookies
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BL...Savoir plus
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...Savoir plus
Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is im...Savoir plus
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use stron...Savoir plus
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...Savoir plus
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Savoir plus
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel se...Savoir plus
The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer Science, and this book is bas...Savoir plus
When the SCION project started in 2009, the goal was to create an architecture offering high availability and security for basic point-to-point commun...Savoir plus
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reve...Savoir plus
Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led...Savoir plus
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security ...Savoir plus
It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software i...Savoir plus
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure"...Savoir plus
This is the first comprehensive and integrated treatment of key establishment protocols. It is aimed mainly at researchers and security professionals,...Savoir plus
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure"...Savoir plus
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security ...Savoir plus
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...Savoir plus
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...Savoir plus
This book is the first to develop a systematized approach for the comparison and evaluation of secure deletion solutions. The book focuses on novel se...Savoir plus
Locally computable (NC 0 ) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of the...Savoir plus
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...Savoir plus
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic...Savoir plus
Locally computable (NC 0 ) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of the...Savoir plus