Skip to main content

Recommended For You

Loading...

Shopping Cart

You're getting the VIP treatment!

Item(s) unavailable for purchase
Please review your cart. You can remove the unavailable item(s) now or we'll automatically remove it at Checkout.
itemsitem
itemsitem


the design of rijndael: aes — the advanced encryption standard (information security and cryptography) by joan daemen, vincent rijmen

Showing 1 - 12 of 47583 results
Skip side bar filters
  • Advances in Cryptology – EUROCRYPT 2018

    37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I

    Book 10820 - Lecture Notes in Computer Science
    The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical ... Read more

    $98.09 USD

  • Advances in Cryptology – EUROCRYPT 2019

    38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part II

    Book 11477 - Lecture Notes in Computer Science
    The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical ... Read more

    $98.09 USD

  • Advances in Cryptology – EUROCRYPT 2019

    38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I

    Book 11476 - Lecture Notes in Computer Science
    The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical ... Read more

    $98.09 USD

  • Advances in Cryptology – EUROCRYPT 2018

    37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III

    Book 10822 - Lecture Notes in Computer Science
    The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical ... Read more

    $197.09 USD

  • Advances in Cryptology – EUROCRYPT 2019

    38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part III

    Book 11478 - Lecture Notes in Computer Science
    The three volume-set LNCS 11476, 11477, and 11478 constitute the thoroughly refereed proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2019,held in Darmstadt, Germany, in May 2019.The 76 full papers presented were carefully reviewed and selected from 327 submissions. The papers are organized into the following topical ... Read more

    $98.09 USD

  • Advances in Cryptology – EUROCRYPT 2018

    37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II

    Book 10821 - Lecture Notes in Computer Science
    The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical ... Read more

    $125.09 USD

  • Practical Signcryption

    series Information Security and Cryptography
    In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives without having been read by anyone else. The second editor invented ... Read more

    $143.09 USD $116.09 USD

  • Novel Techniques in Recovering, Embedding, and Enforcing Policies for Control-Flow Integrity

    by Yan Lin ...
    series Information Security and Cryptography
    There are three fundamental components in Control-Flow Integrity (CFI) enforcement. The first component is accurately recovering the policy (CFG). Usually, the more precise the policy is, the more security CFI improves, but precise CFG generation was considered hard without the support of source code. The second component is embedding the CFI policy securely. Current CFI enforcement usually ... Read more

    $89.09 USD

  • Cryptography in Constant Parallel Time

    series Information Security and Cryptography
    Locally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and ... Read more

    $98.09 USD

  • Towards Hardware-Intrinsic Security

    Foundations and Practice

    series Information Security and Cryptography
    Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security ... Read more

    $143.09 USD

  • Data Encryption Standard A Complete Guide - 2020 Edition

    What potential environmental factors impact the Data Encryption Standard effort? For your Data Encryption Standard project, identify and describe the business environment, is there more than one layer to the business environment? How do you mitigate Data Encryption Standard risk? Why not do Data Encryption Standard? What are your best practices for minimizing Data Encryption Standard project risk, ... Read more

    $55.49 USD

  • Modern Cryptography: Applied Mathematics for Encryption and Information Security

    by Chuck Easttom ...
    This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise requiredCryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied ... Read more

    $38.89 USD