1
2
Table of Contents:
“...Coding Theory -- Symmetric Cryptography: Constructions and Attacks -- Zero-Knowledge Protocols -- Digital Signature Schemes and Extensions -- Advances in Post-Quantum Cryptography -- Cryptography in practice: Analyses and Constructions....”
Full text
Full text
3
Fritsch, Lothar
2024
Table of Contents:
“...Privacy and data protection -- Cryptography, protocols, analysis -- Cyber security -- Aspects of trust -- Defenses and forensics -- Machine learning and artificial intelligence in information security....”2024
Full text
4
5
Sharp, Robin
2024
Table of Contents:
“...Chapter 1. Introduction: Why cybersecurity? -- Chapter 2. Technique and human beings -- Chapter 3. Risk -- Chapter 4. Cryptography -- Chapter 5. Applied Cryptography -- Chapter 6. Communication networks -- Chapter 7. Network Applications -- Chapter 8...”2024
Full text
6
7
8
9
Ge, Chunpeng
2024
Table of Contents:
“... Transformers -- Cryptography Engineering: Hardware Acceleration of NTT-Based Polynomial Multiplication in CRYSTALS-Kyber -- V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture -- Cryptanalysis: Improved Integral Cryptanalysis of Block Ciphers...”2024
Full text
10
Ge, Chunpeng
2024
Table of Contents:
“... Scheme with Blockchain on non-IID Data -- A Blockchain-Based Personal Health Record Sharing Scheme with Security and Privacy Preservation -- Cryptography primitive: General Constructions of Fuzzy Extractors for Continuous Sources -- Geometry-based Garbled...”2024
Full text
11
12
13
14
15
16
17
18
Carlet, Claude
2024
Table of Contents:
“... -- Symmetric cryptography and fault attacks -- The Random Fault Model -- Probabilistic Related-Key Statistical Saturation Cryptanalysis -- Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher -- Post-Quantum Analysis...”2024
Full text
19
20