Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Marius Iulian Mihailescu, PhD is CEO at Dapyx Solution Ltd., a company based in Bucharest, Romania and involved in information security- and cryptography-related research projects. He is a lead guest editor for applied cryptography journals and a reviewer for multiple publications with information security and cryptography profiles. He authored and co-authored more than 30 articles in conference proceedings, 25 articles in journals, and three books. For more than six years he has served as a lecturer at well-known national and international universities (University of Bucharest, "Titu Maiorescu" University, Kadir Has University in, Istanbul, Turkey). He has taught courses on programming languages (C#, Java, C++, Haskell), and object-oriented system analysis and design with UML, graphs, databases, cryptography and information security. He served for three years as IT Officer at Royal Caribbean Cruises Ltd. where he dealt with IT infrastructures, data security, and satellite communications systems. He received his PhD in 2014 and his thesis was on applied cryptography over biometrics data. He holds two MSc in information security and software engineering.
Stefania Loredana Nita, PhD is a software developer at the Institute of Computer Science of the Romanian Academy and a Fellow PhD with her thesis on advanced cryptographic schemes using searchable encryption and homomorphic encryption. She has served more than two years as an assistant lecturer at the University of Bucharest where she taught courses on subjects such as advanced programming techniques, simulation methods, and operating systems. She has authored and co-authored more than 15 workpapers at conferences and journals, and has authored two books on he Haskell programming language. She is a lead guest editor for special issues on information security and cryptography such as Advanced Cryptography and Its Future: Searchable and Homomorphic Encryption. She holds an MSc in software engineering and two BSc in computer science and mathematics.
1. Introduction.- 2. MATLAB Cryptography Functions.- 3. Conversions used in Cryptography.- 4. Basic Arithmetic Foundations.- 5. Number Theory.- 6. Classical Cryptography.- 7. Pseudo Random Generators.- 8. Hash Functions.- 9. Formal Techniques for Cryptography.- 10. Symmetric Encryption Schemes with Case Studies.- 11. Asymmetric Encryption Schemes.- 12. Visual Cryptography.- 13. Steganography.- 14. Chaos-based Cryptography.
--------------------------------------------------------------------------------------------------------------
OLD ToC below
PART 1 - FOUNDATIONS.
1. Cryptography Fundamentals.- 2. Mathematical Background and Its Applicability.- 3. Large Integer Arithmetic.- 4. Floating-point Arithmetic.- 5. New Features in MATLAB 10.- 6. Secure Coding Guidelines.- 7. Cryptography Libraries in MATLAB
PART 3 - PRO CRYPTANALYSIS.
16. Introduction to Cryptanalysis.- 17. General notions for Conducting Cryptanalysis Attacks.- 18. Linear and Differential Cryptanalysis.- 19. Integral Cryptanalysis.- 20. Attacks.- 21. Text Characterization.- 22. Basic Implementations of Cryptanalysis Methods.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.