Cryptography: A Very Short Introduction

Recent Trends in

Fred Piper, Sean Murphy – Cryptography: A Very Short Introduction
Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions, 3rd Edition by Joshua Wright, Johnny Cache
John Hershey – Cryptography Demystified
Ignacio Luengo – Recent Trends in Cryptography
Progress in Cryptology – AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings by Marc Joye

Fred Piper, Sean Murphy – Cryptography: A Very Short Introduction

Published: 2002-07-15 | 160 pages | 3.11 MB
This book is a clear and informative introduction to cryptography and data protection–subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods.

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions, 3rd Edition by Joshua Wright, Johnny Cache

English | March 16th, 2015 | 545 pages | True PDF | 65.69 MB
Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures.
Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.

John Hershey – Cryptography Demystified

Published: 2002-09-13 | PDF | 356 pages | 9.04 MB
AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY
Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics―but dread the thick tomes that are your only other option―help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that’s actually fun to use.
You must read this book if―
* You prefer your simplifications from an expert who understands the complexities
* 6 years of success as a short course for students and professionals works for you
* you enjoy hearing the phrase “nothing to memorize”
* ecommerce, email, network security, or wireless communications is part of your bailiwick
* cracking cryptography means a jump up the career ladder
* the words “public-key cryptography,” “channel-based cryptography,” and “prime numbers” pique your interest
* best-practices cryptography is the only secure way for you―and your company―to go
One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial―the first to make the basics of the science truly accessible.

Ignacio Luengo – Recent Trends in Cryptography

Published: 2009-02-06 | PDF | 141 pages | 0.9 MB
This volume contains articles representing the courses given at the 2005 RSME Santalo Summer School on ‘Recent Trends in Cryptography’. The main goal of the Summer School was to present some of the recent mathematical methods used in cryptography and cryptanalysis. The School was oriented to graduate and doctoral students, as well as recent doctorates. The material is presented in an expository manner with many examples and references. The topics in this volume cover some of the most interesting new developments in public key and symmetric key cryptography, such as pairing based cryptography and lattice based cryptanalysis.

Progress in Cryptology – AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings by Marc Joye

English | 2017 | 231 Pages | PDF | 6.92 MB
This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2017, held in Dakar, Senegal, in May 2017.The 13 papers presented in this book were carefully reviewed and selected from 40 submissions. The papers are organized in topical sections on cryptographic schemes, side-channel analysis, differential cryptanalysis, applications, and number theory.