top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Hardware for Quantum Computing / / by Chuck Easttom
Hardware for Quantum Computing / / by Chuck Easttom
Autore Easttom Chuck
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (188 pages)
Disciplina 621.382
Soggetto topico Telecommunication
Quantum computers
Computers
Cryptography
Data encryption (Computer science)
Communications Engineering, Networks
Quantum Computing
Hardware Performance and Reliability
Cryptology
ISBN 3-031-66477-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Trapped Ion Quantum Computing -- Chapter 2. Superconducting Quantum Computing -- Chapter 3. Photonic Quantum Computing -- Chapter 4. Bose – Einstein Condensate -- Chapter 5. Nitrogen Vacancy Centers -- Chapter 6. Nuclear Magnetic Resonance Quantum Computing -- Chapter 7. Electron Based Quantum Computing -- Chapter 8. Fullerene Based Quantum Computers -- Chapter 9. D-Wave and Adiabatic Quantum Computing -- Chapter 10. Topological Quantum Computing -- Chapter 11. Neutral Atom Based Quantum Computing -- Chapter 12. Reducing Noise and Error Correcting.
Record Nr. UNINA-9910886078503321
Easttom Chuck  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Modern cryptography : applied mathematics for encryption and information security / / Chuck Easttom
Modern cryptography : applied mathematics for encryption and information security / / Chuck Easttom
Autore Easttom Chuck
Edizione [Second edition.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (460 pages)
Disciplina 005.8
Soggetto topico Computer security
Cryptography
Data encryption (Computer science)
ISBN 9783031123047
9783031123030
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Introduction -- Contents -- About the Author -- Abbreviations -- Chapter 1: History of Cryptography to the 1800s -- Introduction -- In This Chapter We Will Cover the Following -- Why Study Cryptography? -- What Is Cryptography? -- Substitution Ciphers -- The Caesar Cipher -- Mathematical Notation of the Caesar Cipher -- Atbash Cipher -- Affine Ciphers -- ROT 13 -- Homophonic Substitution -- The Great Cipher -- Copiale Cipher -- Polybius Cipher -- Ancient Cryptography in Modern Wars -- Null Cipher -- Multi-alphabet Substitution -- Tabula Recta -- Vigenère -- The Beaufort Cipher -- Devices -- Scytale Cipher -- Alberti Cipher Disk -- The Jefferson Disk -- Phaistos Disc -- Phryctoriae -- Book Ciphers -- Beale Ciphers -- Dorabella Cipher -- Babington Plot Ciphers -- Transposition Ciphers -- Reverse Order -- Rail Fence Cipher -- Geometric Shape Cipher -- Columnar Cipher -- Myskowski Variation -- Combinations -- D'Agapeyeff Cipher -- Conclusions -- Test Your Knowledge -- References -- Chapter 2: History of Cryptography from the 1800s -- Introduction -- In This Chapter We Will Cover the Following -- Playfair -- Two-Square Cipher -- Four-Square Cipher -- Hill Cipher -- ADFGVX -- Bifid -- The Gronsfeld Cipher -- The Vernam Cipher -- Edgar Allan Poe -- Cryptography Comes of Age -- Enigma -- Enigma Variations -- Alan Turing -- Kryha -- SIGABA -- Lorenz Cipher -- Navajo Code Talkers -- VIC Cipher -- IFF Systems -- The NSA: The Early Years -- Conclusions -- Test Your Knowledge -- References -- Chapter 3: Basic Information Theory -- Introduction -- In This Chapter We Will Cover -- The Information Age -- Claude Shannon -- Theorem 1: Shannon's Source Coding Theorem -- Theorem 2: Noisy Channel Theorem -- Concepts -- Information Entropy -- Quantifying Information -- Confusion and Diffusion -- Avalanche -- Hamming Distance -- Hamming Weight.
Kerckhoffs's Principle/Shannon's Maxim -- Information Diversity -- Scientific and Mathematical Theories -- What Is a Mathematical Theory? -- The Scientific Process -- A Scientific Theory -- A Look at Successful Scientific Theories -- Binary Math -- Converting -- Binary Operations -- Binary AND -- Binary OR -- Binary XOR -- Conclusions -- Test Your Knowledge -- References -- Chapter 4: Essential Number Theory and Discrete Math -- Introduction -- In This Chapter We Will Cover -- Number Systems -- Natural Numbers -- Integers -- Rational Numbers -- Irrational Numbers -- Real Numbers -- Complex Numbers -- Transcendental Numbers -- Prime Numbers -- Finding Prime Numbers -- Mersenne Prime -- Fermat Prime -- Eratosthenes Sieve -- Other Sieves -- Lucas-Lehmer Test -- Relatively Prime -- Important Operations -- Divisibility Theorems -- Summation -- Logarithms -- Natural Logarithm -- Discrete Logarithm -- Modulus Operations -- Congruence -- Congruence Classes -- Famous Number Theorists and Their Contributions -- Fibonacci -- Fermat -- Euler -- Goldbach -- Discrete Mathematics -- Set Theory -- Logic -- Propositional Logic -- Building Logical Constructs -- Truth Tables -- Combinatorics -- Permutations -- Conclusions -- Test Your Knowledge -- References -- Chapter 5: Essential Algebra -- Introduction -- In This Chapter We Will Cover -- Groups, Rings, and Fields -- Groups -- Abelian Group -- Cyclic Group -- Rings -- Fields -- Galois Fields -- Diophantine Equations -- Linear Algebra -- Matrix Addition and Multiplication -- Matrix Transposition -- Submatrix -- Identity Matrix -- Determinants -- Eigenvalues and Eigenvectors -- Vector Spaces -- Algorithms -- Basic Algorithms -- Sorting Algorithms -- Quick Sort -- Bubble Sort -- Euclidean Algorithm -- Designing Algorithms -- Conclusions -- Test Your Knowledge -- References -- Chapter 6: Feistel Networks -- Introduction.
Cryptographic Keys -- Feistel Function -- Unbalanced Feistel -- Pseudo-Hadamard Transform -- MDS Matrix -- Lucifer -- DES -- 3DES -- s-box and p-box -- DEAL -- MacGuffin -- GOST -- Blowfish -- Twofish -- Skipjack -- CAST -- FEAL -- MARS -- TEA -- XTEA -- LOKI97 -- Camellia -- ICE -- Simon -- IDEA -- MISTY1 -- KASUMI -- MAGENTA -- Speck -- Symmetric Methods -- ECB -- CBC -- PCBC -- CFB -- Galois/Counter Mode -- Conclusions -- Test Your Knowledge -- References -- Chapter 7: Substitution-Permutation Networks -- Introduction -- In This Chapter We Will Cover -- Replacing DES -- AES -- Rijndael Steps -- Rijndael Outline -- Initial Round -- Rounds -- Final Round -- Rijndael s-box -- Rijndael Key Schedule -- The Operations -- The Actual Key Schedule -- Serpent -- Serpent s-boxes -- Serpent Key Schedule -- The Serpent Algorithm -- Square -- SHARK -- SAFER -- The Round Function -- Key Schedule -- KHAZAD -- NESSIE -- Stream Ciphers -- LFSR -- RC4 -- RC4 Key Schedule Algorithm -- FISH -- PIKE -- eSTREAM -- SNOW -- Rabbit -- HC-128 -- MICKEY -- A5 -- Phelix -- Salsa20 -- One-Time Pad -- Conclusions -- Test Your Knowledge -- References -- Chapter 8: s-box Design -- Introduction -- Why Study s-box Design? -- Critical to Block Ciphers -- Designing Ciphers -- Altering s-boxes -- General Facts About s-boxes -- Types of s-boxes -- Design Considerations -- Strict Avalanche Criterion -- Balance -- Bit Independence Criterion -- Approaches to s-box Design -- DES s-box -- The Actual s-boxes for DES -- The Rijndael s-box -- The Irreducible Polynomial -- Multiplicative Inverse -- Affine Transformation -- Generating the s-box -- An Example -- Changing the Rijndael s-box -- s-box Variations -- Key-Dependent s-boxes -- Chaos-Driven s-boxes -- Conclusions -- Test Your Knowledge -- References -- Chapter 9: Cryptographic Hashes -- Introduction -- In This Chapter We Will Cover.
What Is a Cryptographic Hash? -- How Are Cryptographic Hashes Used? -- Message Integrity -- Password Storage -- Forensic Integrity -- Merkle-Damgard -- Specific Algorithms -- Checksums -- Longitudinal Parity Check -- Fletcher Checksum -- MD5 -- SHA -- SHA-1 -- SHA-2 -- SHA-3 -- RIPEMD -- Tiger -- HAVAL -- NTLM -- NTLM v1 -- NTLMv2 -- Whirlpool -- Skein -- FSB -- GOST -- BLAKE -- Grøstl -- SWIFFT -- MAC and HMAC -- Key Derivation Functions -- Conclusions -- Test Your Knowledge -- References -- Chapter 10: Asymmetric Algorithms -- Introduction -- In This Chapter We Will Cover the Following -- What Is Asymmetric Cryptography? -- Indistinguishability -- RSA -- RSA Example 1 -- RSA Example 2 -- Factoring RSA Keys -- The Rabin Cryptosystem -- Diffie-Hellman -- ElGamal -- MQV -- YAK -- Forward Secrecy -- Optimal Asymmetric Encryption Padding -- Cramer-Shoup -- Applications -- Key Exchange -- Digital Signatures -- Digital Signature Algorithm -- Digital Certificates -- SSL/TLS -- Homomorphic Encryption -- Conclusions -- Test Your Knowledge -- References -- Chapter 11: Elliptic Curve Cryptography -- Introduction -- In This Chapter, We Will Cover the Following -- General Overview -- Basic Operations on Elliptic Curves -- The Algorithm -- ECC Variations -- ECC Diffie-Hellman -- ECC DSA -- Conclusions -- Test Your Knowledge -- References -- Chapter 12: Random Number Generators -- Introduction -- In This Chapter We Will Cover -- What Makes a Good PRNG? -- Desirable Properties of Pseudorandom Numbers -- Tests of Randomness -- 1-D Test -- Equidistribution -- Runs Test -- Test for Longest Run of 1s -- Poker Test -- Statistical Tests -- Chi-Squared Test -- Standards for PRNG -- Specific Algorithms -- Mid-Square -- Linear Congruential Generator -- Lagged Fibonacci Generators -- Lehmer Algorithm -- Mersenne Twister -- Blum Blum Shub -- Yarrow -- Fortuna -- DUAL_EC_DRBG.
The Marsaglia CD ROM -- Improving PRNGs -- Shuffling -- Cryptographic Hash -- Conclusions -- Test Your Knowledge -- References -- Chapter 13: SSL/TLS -- Introduction -- In This Chapter We Will Cover -- Digital Signatures -- Direct Signature -- Arbitrated Digital Signature -- Blind Signatures -- Digital Certificates -- X.509 -- Specific Types of X.509 Certificates -- PGP -- Alternate Certificate Types -- Public Key Infrastructure X.509 -- SSL and TLS -- History -- The Handshake Step by Step -- Handshake Initiation -- Applications of SSL/TLS -- OpenSSL -- VoIP -- Email -- Web Servers -- Apache Web Server -- IIS -- Conclusions -- Test Your Knowledge -- References -- Chapter 14: Virtual Private Networks, Authentication, and Wireless Security -- Introduction -- In This Chapter We Will Cover -- Concepts -- Authentication -- CHAP -- EAP -- LEAP -- EAP-TLS -- PEAP -- EAP-POTP -- Kerberos -- SESAME -- NTLM -- PPTP -- PPTP Authentication -- PPTP Encryption -- L2TP -- IPSec -- IKE Phase 1 -- Main Mode -- Aggressive Mode -- IKE Phase 2 -- VPN Gateways and Concentrators -- SSL/TLS -- Other Secure Communications -- SSH -- Wi-Fi Encryption -- WEP -- WPA -- WPA2 -- WPA3 -- Conclusions -- Test Your Knowledge -- References -- Chapter 15: Military Applications -- Introduction -- In This Chapter We Will Cover -- NSA and Cryptography -- Security Classifications -- NSA Cryptographic Standards -- Type 1 Products -- HAIPE-IS -- HAVE QUICK -- SINCGARS -- Type 2 Products -- Fortezza Plus -- Fishbowl -- Type 3 and 4 Products -- Suite A -- SAVILLE -- BATON -- FIREFLY -- Suite B -- The Modern Role of the NSA -- Secure Phones -- US Cryptography Laws and Regulations -- How Do Other Nations Handle Cryptography? -- International Regulations and Agreements -- COCOM and Wassenaar -- Specific Governments -- Cryptography and Malware -- Weaponized Malware -- Cyber Warfare -- TOR.
TOR Technical Details.
Record Nr. UNISA-996495559603316
Easttom Chuck  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Modern Cryptography : Applied Mathematics for Encryption and Information Security / / by William Easttom
Modern Cryptography : Applied Mathematics for Encryption and Information Security / / by William Easttom
Autore Easttom Chuck
Edizione [2nd ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (460 pages)
Disciplina 005.8
Collana Computer Science Series
Soggetto topico Telecommunication
Data structures (Computer science)
Information theory
Number theory
Data protection
Computational intelligence
Statistics
Communications Engineering, Networks
Data Structures and Information Theory
Computational Number Theory
Data and Information Security
Computational Intelligence
Applied Statistics
ISBN 9783031123047
9783031123030
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800’s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography.
Record Nr. UNINA-9910624391103321
Easttom Chuck  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Modern cryptography : applied mathematics for encryption and information security / / William Easttom
Modern cryptography : applied mathematics for encryption and information security / / William Easttom
Autore Easttom Chuck
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XIX, 390 p. 161 illus., 85 illus. in color.)
Disciplina 621.3
Soggetto topico Electrical engineering
Data structures (Computer science)
ISBN 3-030-63115-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800’s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography.
Record Nr. UNINA-9910484532303321
Easttom Chuck  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
System forensics, investigation, and response / / Chuck Easttom
System forensics, investigation, and response / / Chuck Easttom
Autore Easttom Chuck
Edizione [Second edition.]
Pubbl/distr/stampa Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014
Descrizione fisica 1 online resource (390 pages) : illustrations
Disciplina 363.25/968
Collana Jones & Bartlett Learning Information Systems Security & Assurance Series
Soggetto topico Computer crimes - Investigation
ISBN 1-284-03108-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The system forensics landscape. Introduction to forensics ; Overview of computer crime ; Forensics methods and labs -- Technical overview: system forensics tools, techniques, and methods. Collecting, seizing, and protecting evidence ; Understanding techniques for hiding and scrambling information ; Recovering data ; E-mail forensics -- Windows forensics ; Linux forensics ; Macintosh forensics ; Mobile forensics ; Performing network analysis -- Incident response and resources. Incident and intrusion response ; Trends and future directions ; System forensics resources.
Record Nr. UNINA-9910165026903321
Easttom Chuck  
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Windows Forensics : Understand Analysis Techniques for Your Windows / / by Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer
Windows Forensics : Understand Analysis Techniques for Your Windows / / by Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer
Autore Easttom Chuck
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Descrizione fisica 1 online resource (484 pages)
Disciplina 5,268
Altri autori (Persone) ButlerWilliam
PhelanJessica
Sai BhagavatulaRamya
SteuberSean
RodriguezKarely
Indy BalkissoonVictoria
NaseerZehra
Soggetto topico Microsoft software
Microsoft .NET Framework
Microsoft
ISBN 979-88-6880-193-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1: Introduction to Windows -- Chapter 2: Forensics Concepts -- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy -- Chapter 4: Windows File Artifacts -- Chapter 5: Windows Registry Part 1 -- Chapter 6: Windows Registry Part 2 -- Chapter 7: Windows Shadow Copy -- Chapter 8: Windows Memory Forensics -- Chapter 9: PowerShell Forensics -- Chapter 10: Web Browser Forensics -- Chapter 11: Windows Email Forensics -- Chapter 12: Microsoft Azure and Cloud Forensics -- Chapter 13: Data-Hiding Techniques in Windows -- Appendix A: Volatility Cheat Sheet -- Appendix B: Windows Registry Cheat Sheet.
Record Nr. UNINA-9910865263503321
Easttom Chuck  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui