Nova Publishers
My Account Nova Publishers Shopping Cart
HomeBooksSeriesJournalsReference CollectionseBooksInformationSalesImprintsFor Authors
            
  Top » Catalog » Books » Computer Science and Robotics » My Account  |  Cart Contents  |  Checkout   
Quick Find
  
Use keywords to find the product you are looking for.
Advanced Search
What's New? more
Central Asia: Perspectives and Present Challenges
$144.00
Shopping Cart more
0 items
Information
Shipping & Returns
Privacy Notice
Conditions of Use
Contact Us
Bestsellers
01.Robotics in Surgery: History, Current and Future Applications
02.From Problem Toward Solution: Wireless Sensor Networks Security
03.Introduction to Graph and Hypergraph Theory
04.Intelligent Vehicle Systems: A 4D/RCS Approach
05.Artificial Intelligence in Energy and Renewable Energy Systems
06.Computer Vision and Robotics
07.MOSFETs: Properties, Preparations and Performance
08.Expert Systems Research Trends
09.Progress in Autonomous Robot Research
10.Quantum Dots: Research, Technology and Applications
Notifications more
NotificationsNotify me of updates to Cryptography Research Perspectives
Tell A Friend
 
Tell someone you know about this product.
Cryptography Research Perspectives
Retail Price: $205.00
10% Online Discount
You Pay:

$184.50
Editors: Roland E. Chen
Book Description:
Cryptography is considered to be a branch of both mathematics and computer science, and is affiliated closely with information theory, computer security, and engineering. Cryptography is used in applications present in technologically advanced societies; examples include the security of ATM cards, computer passwords, and electronic commerce, which all depend on cryptography. This new book presents state-of-the-art research in the field from around the world.

Table of Contents:
Preface

Chapter 1. Constructive Codes for Classical and Quantum Wiretap Channels;pp. 1-48
(Mitsuru Hamada, Quantum Information Science Research Center, Tamagawa University Research Institute, Japan, PRESTO, Japan Science and Technology Agency, Japan)

Chapter 2. Concurrent Error Detection Correction in Finite Field Arithmetic Architectures over GF(2m);pp. 49-96
(Chiou-Yng Lee, Department of Computer Information and Network Engineering, Lunghwa University of Science and Technology, Taiwan, Pramod Kumar Meher, School of Computer Engineering, Nanyang Technological University, Singapore, Che Wun Chiou, Department of Computer Science and Information Engineering Ching Yun University, Taiwan, et al.)

Chapter 3. Fingerprint Based Encryption;pp. 97-123
(Jie Tian, Institute of Automation, Chinese Academy of Science, Graduate School of the Chinese Academy of Science, Beijing, Life Science Research Center, Xidian University, China, Peng Shi, Xin Yang, Institute of Automation, Chinese Academy of Science, Graduate School of the Chinese Academy of Science, Beijing, et al.)

Chapter 4. On the Properties of Stream Ciphers Based on Extremal Directed Graphs;pp. 125-141
(V. Ustimenko and J. Kotorowicz)

Chapter 5. Morpheus: A Word Oriented Stream Cipher;pp. 143-156
(Nikos Komninos, Algorithms and Security Group, Athens Information Technology, Greece)

Chapter 6. On the Optimal Mean Photon Number for Quantum Cryptography;pp. 157-175
(David S. Pearson and Chip Elliot, BBN Technologies, USA)

Chapter 7. Real-World Evolutionary Designs: Secure Evolvable Hardware for Public-Key Cryptosystems;pp. 177-203
(Nadia Nedjah and Luiza de Macedo Mourelle, State University of Rio de Janeiro, Brazil)

Chapter 8. Private and Public Key Systems Using Graphs of High Girth;pp.205-216
(Abderezak Touzene and Vasyl Ustimenko, Inst. of Mathematics, University of Maria Courie Sklodovska, Lublin, Poland)

Chapter 9. Performance for Cryptography: a hardware approach;pp. 217-232
(Athanasios P. Kakarountas, University of Central Greece, Greece, Haralambos Michail, Department of Electrical and Computer Eng.
University of Patras, Greece)

Chapter 10. A Survey on Broadcast Encryption;pp. 233-248
(Scott C.H. Huang and Ding-Zhu Du, University of Minnesota)

Index

   Binding: Hardcover
   Pub. Date: 2009
   ISBN: 978-1-60456-492-1
   Status: AV
  
Status Code Description
AN Announcing
FM Formatting
PP Page Proofs
FP Final Production
EP Editorial Production
PR At Prepress
AP At Press
AV Available
  
Special Focus Titles
01.Violent Communication and Bullying in Early Childhood Education
02.Cultural Considerations in Intervention with Women and Children Exposed to Intimate Partner Violence
03.Chronic Disease and Disability: The Pediatric Lung
04.Fruit and Vegetable Consumption and Health: New Research
05.Fire and the Sword: Understanding the Impact and Challenge of Organized Islamism. Volume 2

Nova Science Publishers
© Copyright 2004 - 2020

Cryptography Research Perspectives