Allon Adir, Ehud Aharoni, Nir Drucker, Ronen Levy, Hayim Shaul, Omri Soceanu. — Springer, 2024. — 325 р. — ISBN 978-3-031-65494-7. This book provides basic knowledge required by an application developer to understand and use the Fully Homomorphic Encryption (FHE) technology for privacy preserving Data-Science applications. The authors present various techniques to leverage the...
The Institution of Engineering and Technology, 2019. — 370 p. — ISBN 978-1-78561-556-6. Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present...
No Starch Press, Inc., 2021. — 160 p. — ISBN-13: 978-1-7185-0141-6 (ebook). Rigorous in its definitions yet easy to read, Crypto Dictionary covers the field of cryptography in an approachable, and sometimes humorous way. Expand your mind and your crypto knowledge with the ultimate desktop dictionary for all things cryptography. Written by a renowned cryptographer for experts...
No Starch Press, 2020. — 312 p. — ISBN: 978-1-59327-826-7. With some corrections, 2-Jan-2020 This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and...
No Starch Press, 2017. — 312 p. This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of cryptography without shying away from meaty discussions of how they work. You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.
2nd Edition. — No Starch Press, 2024. — 360 p. — ISBN: 978-1-71850-384-7. Crypto can be cryptic. Serious Cryptography, 2nd Edition arms you with the tools you need to pave the way to understanding modern crypto. This thoroughly revised and updated edition of the bestselling introduction to modern cryptography breaks down fundamental mathematical concepts without shying away...
Springer, 2022. — 612 p. — (Computer Architecture and Design Methodologies). — ISBN 978-981-16-6522-6. This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible...
Springer, 2023. — 230 p. — ISBN 978-3-031-32958-6. Классическая и современная криптография для начинающих This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and...
CRC Press, 2025. — 175 p. — (Cyber Shorts). — ISBN 978-1-032-84623-1. This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience. To provide the necessary...
John Wiley/IEEE Press, 2013, — 210 p. — (IEEE Press series on information and communication networks security). — ISBN: 978-1-118-31712-9. There are now many texts available giving an overview of both public key and symmetric key cryptography. The focus of this text is only the former. The objective is to give a complete description of the current major public key...
De Gruyter, 2015. — 390 p. — (De Gruyter Graduate). — ISBN 978-3-11-037276-2, 978-3-11-037277-9, 978-3-11-038616-5. Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew...
CRC Press, 2023. — 257 p. This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques, in a single volume. It comprehensively covers important topics in the field of quantum cryptography with applications, including quantum key distribution,...
John Wiley & Sons, Inc., 2020. — 304 p. — ISBN: 978-1-119-61222-3 (ebk). Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users,...
Springer, 2021. — 294 p. — ISBN 978-3-030-73492-3 (eBook). Cryptography, as done in this century, is heavily mathematical. But it also has roots in what is computationally feasible. This unique textbook text balances the theorems of mathematics against the feasibility of computation. Cryptography is something one actually “does”, not a mathematical game one proves theorems...
PE Press, 2016. — 256 р. This book is an introductory crash course to Cryptography and Cryptanalysis. It is presented using a ground-up approach to learning so that readers of all knowledge levels can understand the content. It provides a brief history of Cryptography, and attempts to explain what Cryptography is and why it is so important to everyone today. In this second...
IGI Global, 2020. — 380 p. — ISBN: 978-1799822554 (eISBN). The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a...
Mercury Learning and InforMation LLC., 2020. — 350 p. — ISBN: 978-1683925316. Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the...
Apress Media LLC., 2020. — 297 p. — ISBN13: (electronic): 978-1-4842-6056-2. Cryptography and encryption aren’t just for geeks and spies―they’re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to fending off data theft and eavesdroppers. You will uncover...
Nobtrex L.L.C., 2024. — 162 p. — ISBN 9798230066170. PDF, EPUB (true) Cryptography Basics for New Coders: A Practical Guide with Examples offers a thorough introduction to the essential concepts and methods used to secure information in the digital age. Written for beginners in computer science and coding, the book breaks down complex topics such as encryption, authentication,...
Independently published, 2021. — 295 p. — ASIN : BB093DGJMRD. Cryptography is an automated mathematical tool that plays a vital role in network security. It assures the confidentiality and integrity of data as well as provides authentication and non-repudiation to the users. For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and...
Wiley Publishing, Inc., 2011. — 725 p. — ISBN: 978-1-118-03875-8 (ebk). Hands-on, practical guide to implementing SSL and TLS protocols forInternet security If you are a network professional who knows C programming, thispractical book is for you. Focused on how to implement SecureSocket Layer (SSL) and Transport Layer Security (TLS), this bookguides you through all necessary...
Rheinwerk Computing, 2024. — 325 p. — ISBN 978-1-4932-2566-8. Security professionals, you know encryption is essential to protect your data. In this book, learn about the fundamental concepts of cryptography—and then apply them! Explore algorithms for symmetric and asymmetric cryptography and see how to use encryption strategies to enforce storage and network security. Put...
Bloomsbury Academic, 2023. — 258 p. This book offers a comprehensive review and reassessment of the classical sources describing the cryptographic Spartan device known as the scytale. Challenging the view promoted by modern historians of cryptography which look at the scytale as a simple and impractical 'stick', Diepenbroek argues for the scytale's deserved status as a vehicle...
2nd Edition. — Springer, 2020. — 278 p. — ISBN 978-1-0716-0987-3 (eBook). This book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key...
Wiley Publishing, 2010. — 384 p. — ISBN: 978-0-470-47424-2. Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key...
New York: Prometheus Books, 2015. — 295 p. — ISBN10: 163388144X. Bitcoin, the digital currency, was introduced in 2009 with little fanfare; five years later, shocking the world, it was worth $14 billion. This book explores the cyber currency by focusing on the remarkable stories and intriguing personalities of those responsible for its sudden success: Satoshi Nakamoto, the...
2nd Edition. — Springer, 2014. — 556 p. — (Undergraduate Texts in Mathematicsx). — ISBN 978-1-4939-1710-5, 978-1-4939-1711-2. This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the...
HiTeX Press, 2024. – 406 p. "Practical Cryptography in Software Development: The How-To Guide" is an essential resource for anyone seeking to understand and apply cryptographic principles in the realm of software engineering. This book demystifies the complex world of cryptography by bridging the gap between theoretical concepts and real-world applications. Tailored for both...
Apress Media LLC, 2024. — 224 p. — ISBN-13 979-8-8688-0125-9. Проектирование в соответствии со стандартом FIPS-140: Руководство для инженеров и программистов This book provides detailed and practical information for practitioners to understand why they should choose certification. It covers the pros and cons, and shows how to design to comply with the specifications (FIPS-140,...
Independently published, 2021. — 301 p. — ASIN B08YBL67Z9. This book provides you with advanced knowledge and skills to understand threats and attacks in the network, then apply different defense mechanisms to secure personal and organizational data and systems in a networked environment. The book covers advanced areas of network security and cryptography. It specifically...
3rd edition. — New York: CRC Press/Taylor & Francis Group, 2021. — 649 p. Now the most used textbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal...
Inner Traditions, 2006. — 328 p. An examination of the many theories surrounding this enigmatic text, apparently written in code. - Reveals the connections between this work and the Cathars, Roger Bacon, and John Dee - Explains the cryptanalysis methods used in attempts to break the code - Includes color images from the manuscript juxtaposed with other medieval writings Since...
Springer, 2025. — 96 p. — (SpringerBriefs in Information Security and Cryptography). — ISBN 978-3-031-81249-1. The current digital signature methods like RSA, DSA, and ECDSA are relatively simple to understand, and their signing and verification processes operate in comparable time frames. However, in the quantum computing era, cryptographic methods must be designed to...
O’Reilly Media, 2010. — 460 p. — ISBN: 978-1-56592-402-9. Целевая аудитория: опытные Java разработчики. Если ваше приложение работает с особо секретными данными или же вы просто хотите себя обезопасить, в данном прикладном руководстве вы найдёте многочисленные примеры работы известных криптографических шифров и основы их использования на языке Java. Вам не понадобятся...
CRC Press, 2025. — 292 p. — ISBN: 978-1003508632. This book gives readers a deep insight into cryptography and discusses the various types of cryptography algorithms used for the encryption and decryption of data. It also covers the mathematics behind the use of algorithms for encryption and decryption. Features Presents clear insight to the readers about the various security...
Springer, 2022. — 140 p. — (Mathematics Study Resources 04). — ISBN 978-3-662-66014-0. This book explains compactly, without theoretical superstructure and with as little mathematical formalism as possible, the essential concepts in the encryption of messages and data worthy of protection. The focus is on the description of the historically and practically important cipher,...
Oxford University Press, 2012. — 560 p. — ISBN13: 978-0199695591. Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area...
Apress, 2021. — 469 p. — ISBN 978-1-4842-6586-4. Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 and its new features. You will find the right methods of writing advanced cryptographic algorithms (such as, elliptic curve cryptography algorithms, lattice-based cryptography, searchable encryption, and homomorphic...
2nd Edition. — Apress Media LLC, 2023. — 513 p. — ISBN-13: 978-1-4842-9450-5. Develop strong skills for writing cryptographic algorithms and security schemes/modules using C++23 and its new features. This book will teach you the right methods for writing advanced cryptographic algorithms, such as elliptic curve cryptography algorithms, lattice-based cryptography, searchable...
No Starch Press, 2018. — 248 p. — ISBN 9781593277420. Cryptography is hard, but it’s less hard when it’s filled with adorable Japanese manga. The latest addition to the Manga Guide series, The Manga Guide to Cryptography, turns the art of encryption and decryption into plain, comic illustrated English. As you follow Inspector Jun Meguro in his quest to bring a cipher-wielding...
Springer, 2020. — 116 p. — ISBN: 978-3-030-58995-0, 978-3-030-58996-7. This book provides comprehensive coverage of various Cryptography topics, while highlighting the most recent trends such as quantum, blockchain, lightweight, Chaotic and DNA cryptography. Moreover, this book covers cryptography primitives and its usage and applications and focuses on the fundamental...
Springer, 2021. — 112 p. — (SpringerBriefs on Cyber Security Systems and Networks). — ISBN 978-981-33-4881-3. This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers....
2nd Edition. — Mercury Learning and Information, September 27, 2022. — 610 p. — ISBN-13: 978-1-68392-883-6. This new edition introduces the basic concepts in computer networks, blockchain, and the latest trends and technologies in cryptography and network security. The book is a definitive guide to the principles and techniques of cryptography and network security, and...
SoftUni, 2018. — 214 p. — ISBN: 9786190008705. A modern practical book about cryptography for developers with code examples, covering core concepts like: hashes (like SHA-3 and BLAKE2), MAC codes (like HMAC and GMAC), key derivation functions (like Scrypt, Argon2), key agreement protocols (like DHKE, ECDH), symmetric ciphers (like AES and ChaCha20, cipher block modes,...
Apress, 2019. — 379 p. — ISBN: 978-1-4842-4899-7, 978-1-4842-4900-0. Develop a greater intuition for the proper use of cryptography. This book teaches the basics of writing cryptographic algorithms in Python, demystifies cryptographic internals, and demonstrates common ways cryptography is used incorrectly. Cryptography is the lifeblood of the digital world’s security...
Bristol: IOP Publishing Ltd, 2020. — 180 p. — ISBN 978-0-7503-2220-1. Advanced technologies such as Artificial Intelligence (AI), Big Data, Cloud Computing, and Internet-of-Things (IoT) have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the...
Apress, 2020. — 586 p. — ISBN: 9781484263662. Utilize this comprehensive, yet practical, overview of modern cryptography and cryptanalysis to improve performance. Learn by example with source code in C# and .NET, and come away with an understanding of public key encryption systems and challenging cryptography mechanisms such as lattice-based cryptography. Modern cryptography is...
2nd edition. ——Apress, 2025. — 306 p. — ISBN 9798868804403. Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11. Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes challenging cryptographic solutions that are implemented in Java 21 and Jakarta EE 11. It provides a...
Springer, 2020. — 336 p. — ISBN: 978-3-030-34142-8 (eBook). Modern cryptosystems, used in numerous applications that require secrecy or privacy — electronic mail, financial transactions, medical-record keeping, government affairs, social media etc. — are based on sophisticated mathematics and algorithms that in implementation involve much computer arithmetic. And for speed it...
CreateSpace, 2017. — 158 p. The Hash Crack: Password Cracking Manual v2.0 is an expanded reference guide for password recovery (cracking) methods, tools, and analysis techniques. A compilation of basic and advanced techniques to assist penetration testers and network security professionals evaluate their organization's posture. The Hash Crack manual contains syntax and examples...
Oxford University Press, 2002. — 142 p. — (A Very Short Introduction 68). — ISBN: 0-19-280315-8. This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned....
Wiley-ISTE, 2025. — 352 p. — (ISTE Invoiced). — ISBN-13: 978-1-78945-215-0. Embedded Cryptography provides a comprehensive exploration of cryptographic techniques tailored for embedded systems, addressing the growing importance of security in devices such as mobile systems and IoT. The books explore the evolution of embedded cryptography since its inception in the mid-90s and...
Apress Media LLC., 2024. — 274 p. — ISBN-13: 979-8-8688-0503-5. Gain the necessary technical skills, tools, and insights to succeed in the crypto working environment. Changing market conditions have created new opportunities and working conditions. This book goes beyond just getting a job, as it shares a myriad of hidden tips on how to thrive within this constantly evolving...
Feisty Duck, 2014. — 568 p. Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you'll find just the right...
Manning Publications, 2025. — 352 p. — ISBN-13 978-1633437944. Make your public key protocols smaller and more secure with this accessible guide to Elliptic Curve Cryptography. Elliptic Curve Cryptography for Developers introduces the mathematics of elliptic curves—a powerful alternative to the prime number-based RSA encryption standard. You’ll learn to deliver zero-knowledge...
Manning Publications, 2022. — 225 p. Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes―including 30 unbreakable methods.
World Scientific Publishing, 2021. — 286 p. — ISBN 978-981-122-615-1. This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures,...
World Scientific Publishing, 2020. — 374 p. — ISBN 978-981-120-806-5. Cryptology is increasingly becoming one of the most essential topics of interest in everyday life. Digital communication happens by transferring data between at least two participants — But do we want to disclose private information while executing a sensitive bank transfer? How about allowing third-party...
20th Anniversary Edition. — Wiley, 2015. — 784 p. — ISBN: 978-1-119-09672-6. From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most definitive reference on cryptography ever published and is the seminal work on cryptography. Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding...
Bloomsbury Publishing, 2020. — 128 p. — ISBN: 978-1681195148. Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in...
Delacorte Press, 2002. — 263 p. — ISBN10: 0385729138. — ISBN13: 978-0385729130. amazon.com Review Calling upon accounts of political intrigue and tales of life and death, author Simon Singh tells history's most fascinating story of deception and cunning: the science of cryptography--the encoding and decoding of private information. Based on __, this version has been abridged...
8th Edition. — Pearson Education, 2020. — 1513 p. — ISBN 978-0-13-576403-9. Keep pace with the fast-moving field of cryptography and network security Stallings’ Cryptography and Network Security: Principles and Practice , introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and...
CRC Press, 2018. — 205 p. — ISBN: 0815396414. Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the...
Wiley Publishing, Inc., 2008. — 264 p. — ISBN: 047013593X As an instructor at the University of Tulsa, Christopher Swenson could find no relevant text for teaching modern cryptanalysis?so he wrote his own. This is the first book that brings the study of cryptanalysis into the 21st century. Swenson provides a foundation in traditional cryptanalysis, examines ciphers based on...
3rd Edition. — Pearson Education, 2020. — 977 p. — ISBN13: 978-0-13-485906-4. A broad spectrum of cryptography topics, covered from a mathematical point of view Extensively revised and updated, the 3rd Edition of Introduction to Cryptography with Coding Theory mixes applied and theoretical aspects to build a solid foundation in cryptography and security. The authors’ lively,...
India: BPB Publications, 2022. — 716 p. — ISBN 978-93-89328-66-0. Cryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most...
Manning Publications, 2020. — 239 p. If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you’re relying on cryptography. And you’re probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It’s important to understand...
Manning Publications, 2021. — 400 p. — ISBN 9781617296710. If you’re browsing the web, using public APIs, making and receiving electronic payments, registering and logging in users, or experimenting with blockchain, you’re relying on cryptography. And you’re probably trusting a collection of tools, frameworks, and protocols to keep your data, users, and business safe. It’s...
Manning Publications, 2020. — 350 p. — ISBN 1617296716, 9781617296710. Real-World Cryptography teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications. You’ll go hands-on with cryptography building blocks such as hash functions and key exchanges, then learn how to use them as part of your security protocols...
De Gruyter, 2023. — 346 p. — (Quantum Computing). Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum computers are able to compute at full speed. This book presents an overview of all...
John Wiley/Higher Education Press, 2013. — 433 p. — (The Wiley-HEP Information Security Series). — ISBN: 978-1-118-18858-3. The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this...
Springer, 2023. — 202 p. — (Financial Mathematics and Fintech). — ISBN 978-981-19-7643-8. This book covers the most cutting-edge and hot research topics and fields of post-quantum cryptography. The main purpose of this book is to focus on the computational complexity theory of lattice ciphers, especially the reduction principle of Ajtai, in order to fill the gap that...
М.: Манн, Иванов и Фербер, 2016. — ISBN 978-5-00100-130-0. — Изначально электронное издание. В истории любой науки (и не только науки) есть загадки, закодированные послания, скрытая от посторонних информация. В этой книге собрано множество захватывающих историй дешифровки, причем читатель с небольшой помощью автора, специалиста в области компьютерной безопасности, разгадает...
174 с. Слово криптография означает тайнопись. Российская криптография имеет многовековую историю, начинающуюся с указов Петра I о «черных кабинетах». До середины 80-х годов XX века криптография в России использовалась только для военных, дипломатических и правительственных линий связи и была строго засекречена. Даже употребление слов «криптография», «шифры», «ключи к шифрам» в...
Комментарии