Hardware for Quantum Computing / / by Chuck Easttom
| Hardware for Quantum Computing / / by Chuck Easttom |
| Autore | Easttom Chuck |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (188 pages) |
| Disciplina | 621.382 |
| Soggetto topico |
Telecommunication
Quantum computers Computers Cryptography Data encryption (Computer science) Communications Engineering, Networks Quantum Computing Hardware Performance and Reliability Cryptology |
| ISBN | 3-031-66477-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. Trapped Ion Quantum Computing -- Chapter 2. Superconducting Quantum Computing -- Chapter 3. Photonic Quantum Computing -- Chapter 4. Bose – Einstein Condensate -- Chapter 5. Nitrogen Vacancy Centers -- Chapter 6. Nuclear Magnetic Resonance Quantum Computing -- Chapter 7. Electron Based Quantum Computing -- Chapter 8. Fullerene Based Quantum Computers -- Chapter 9. D-Wave and Adiabatic Quantum Computing -- Chapter 10. Topological Quantum Computing -- Chapter 11. Neutral Atom Based Quantum Computing -- Chapter 12. Reducing Noise and Error Correcting. |
| Record Nr. | UNINA-9910886078503321 |
Easttom Chuck
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Modern cryptography : applied mathematics for encryption and information security / / Chuck Easttom
| Modern cryptography : applied mathematics for encryption and information security / / Chuck Easttom |
| Autore | Easttom Chuck |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (460 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Cryptography Data encryption (Computer science) |
| ISBN |
9783031123047
9783031123030 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Introduction -- Contents -- About the Author -- Abbreviations -- Chapter 1: History of Cryptography to the 1800s -- Introduction -- In This Chapter We Will Cover the Following -- Why Study Cryptography? -- What Is Cryptography? -- Substitution Ciphers -- The Caesar Cipher -- Mathematical Notation of the Caesar Cipher -- Atbash Cipher -- Affine Ciphers -- ROT 13 -- Homophonic Substitution -- The Great Cipher -- Copiale Cipher -- Polybius Cipher -- Ancient Cryptography in Modern Wars -- Null Cipher -- Multi-alphabet Substitution -- Tabula Recta -- Vigenère -- The Beaufort Cipher -- Devices -- Scytale Cipher -- Alberti Cipher Disk -- The Jefferson Disk -- Phaistos Disc -- Phryctoriae -- Book Ciphers -- Beale Ciphers -- Dorabella Cipher -- Babington Plot Ciphers -- Transposition Ciphers -- Reverse Order -- Rail Fence Cipher -- Geometric Shape Cipher -- Columnar Cipher -- Myskowski Variation -- Combinations -- D'Agapeyeff Cipher -- Conclusions -- Test Your Knowledge -- References -- Chapter 2: History of Cryptography from the 1800s -- Introduction -- In This Chapter We Will Cover the Following -- Playfair -- Two-Square Cipher -- Four-Square Cipher -- Hill Cipher -- ADFGVX -- Bifid -- The Gronsfeld Cipher -- The Vernam Cipher -- Edgar Allan Poe -- Cryptography Comes of Age -- Enigma -- Enigma Variations -- Alan Turing -- Kryha -- SIGABA -- Lorenz Cipher -- Navajo Code Talkers -- VIC Cipher -- IFF Systems -- The NSA: The Early Years -- Conclusions -- Test Your Knowledge -- References -- Chapter 3: Basic Information Theory -- Introduction -- In This Chapter We Will Cover -- The Information Age -- Claude Shannon -- Theorem 1: Shannon's Source Coding Theorem -- Theorem 2: Noisy Channel Theorem -- Concepts -- Information Entropy -- Quantifying Information -- Confusion and Diffusion -- Avalanche -- Hamming Distance -- Hamming Weight.
Kerckhoffs's Principle/Shannon's Maxim -- Information Diversity -- Scientific and Mathematical Theories -- What Is a Mathematical Theory? -- The Scientific Process -- A Scientific Theory -- A Look at Successful Scientific Theories -- Binary Math -- Converting -- Binary Operations -- Binary AND -- Binary OR -- Binary XOR -- Conclusions -- Test Your Knowledge -- References -- Chapter 4: Essential Number Theory and Discrete Math -- Introduction -- In This Chapter We Will Cover -- Number Systems -- Natural Numbers -- Integers -- Rational Numbers -- Irrational Numbers -- Real Numbers -- Complex Numbers -- Transcendental Numbers -- Prime Numbers -- Finding Prime Numbers -- Mersenne Prime -- Fermat Prime -- Eratosthenes Sieve -- Other Sieves -- Lucas-Lehmer Test -- Relatively Prime -- Important Operations -- Divisibility Theorems -- Summation -- Logarithms -- Natural Logarithm -- Discrete Logarithm -- Modulus Operations -- Congruence -- Congruence Classes -- Famous Number Theorists and Their Contributions -- Fibonacci -- Fermat -- Euler -- Goldbach -- Discrete Mathematics -- Set Theory -- Logic -- Propositional Logic -- Building Logical Constructs -- Truth Tables -- Combinatorics -- Permutations -- Conclusions -- Test Your Knowledge -- References -- Chapter 5: Essential Algebra -- Introduction -- In This Chapter We Will Cover -- Groups, Rings, and Fields -- Groups -- Abelian Group -- Cyclic Group -- Rings -- Fields -- Galois Fields -- Diophantine Equations -- Linear Algebra -- Matrix Addition and Multiplication -- Matrix Transposition -- Submatrix -- Identity Matrix -- Determinants -- Eigenvalues and Eigenvectors -- Vector Spaces -- Algorithms -- Basic Algorithms -- Sorting Algorithms -- Quick Sort -- Bubble Sort -- Euclidean Algorithm -- Designing Algorithms -- Conclusions -- Test Your Knowledge -- References -- Chapter 6: Feistel Networks -- Introduction. Cryptographic Keys -- Feistel Function -- Unbalanced Feistel -- Pseudo-Hadamard Transform -- MDS Matrix -- Lucifer -- DES -- 3DES -- s-box and p-box -- DEAL -- MacGuffin -- GOST -- Blowfish -- Twofish -- Skipjack -- CAST -- FEAL -- MARS -- TEA -- XTEA -- LOKI97 -- Camellia -- ICE -- Simon -- IDEA -- MISTY1 -- KASUMI -- MAGENTA -- Speck -- Symmetric Methods -- ECB -- CBC -- PCBC -- CFB -- Galois/Counter Mode -- Conclusions -- Test Your Knowledge -- References -- Chapter 7: Substitution-Permutation Networks -- Introduction -- In This Chapter We Will Cover -- Replacing DES -- AES -- Rijndael Steps -- Rijndael Outline -- Initial Round -- Rounds -- Final Round -- Rijndael s-box -- Rijndael Key Schedule -- The Operations -- The Actual Key Schedule -- Serpent -- Serpent s-boxes -- Serpent Key Schedule -- The Serpent Algorithm -- Square -- SHARK -- SAFER -- The Round Function -- Key Schedule -- KHAZAD -- NESSIE -- Stream Ciphers -- LFSR -- RC4 -- RC4 Key Schedule Algorithm -- FISH -- PIKE -- eSTREAM -- SNOW -- Rabbit -- HC-128 -- MICKEY -- A5 -- Phelix -- Salsa20 -- One-Time Pad -- Conclusions -- Test Your Knowledge -- References -- Chapter 8: s-box Design -- Introduction -- Why Study s-box Design? -- Critical to Block Ciphers -- Designing Ciphers -- Altering s-boxes -- General Facts About s-boxes -- Types of s-boxes -- Design Considerations -- Strict Avalanche Criterion -- Balance -- Bit Independence Criterion -- Approaches to s-box Design -- DES s-box -- The Actual s-boxes for DES -- The Rijndael s-box -- The Irreducible Polynomial -- Multiplicative Inverse -- Affine Transformation -- Generating the s-box -- An Example -- Changing the Rijndael s-box -- s-box Variations -- Key-Dependent s-boxes -- Chaos-Driven s-boxes -- Conclusions -- Test Your Knowledge -- References -- Chapter 9: Cryptographic Hashes -- Introduction -- In This Chapter We Will Cover. What Is a Cryptographic Hash? -- How Are Cryptographic Hashes Used? -- Message Integrity -- Password Storage -- Forensic Integrity -- Merkle-Damgard -- Specific Algorithms -- Checksums -- Longitudinal Parity Check -- Fletcher Checksum -- MD5 -- SHA -- SHA-1 -- SHA-2 -- SHA-3 -- RIPEMD -- Tiger -- HAVAL -- NTLM -- NTLM v1 -- NTLMv2 -- Whirlpool -- Skein -- FSB -- GOST -- BLAKE -- Grøstl -- SWIFFT -- MAC and HMAC -- Key Derivation Functions -- Conclusions -- Test Your Knowledge -- References -- Chapter 10: Asymmetric Algorithms -- Introduction -- In This Chapter We Will Cover the Following -- What Is Asymmetric Cryptography? -- Indistinguishability -- RSA -- RSA Example 1 -- RSA Example 2 -- Factoring RSA Keys -- The Rabin Cryptosystem -- Diffie-Hellman -- ElGamal -- MQV -- YAK -- Forward Secrecy -- Optimal Asymmetric Encryption Padding -- Cramer-Shoup -- Applications -- Key Exchange -- Digital Signatures -- Digital Signature Algorithm -- Digital Certificates -- SSL/TLS -- Homomorphic Encryption -- Conclusions -- Test Your Knowledge -- References -- Chapter 11: Elliptic Curve Cryptography -- Introduction -- In This Chapter, We Will Cover the Following -- General Overview -- Basic Operations on Elliptic Curves -- The Algorithm -- ECC Variations -- ECC Diffie-Hellman -- ECC DSA -- Conclusions -- Test Your Knowledge -- References -- Chapter 12: Random Number Generators -- Introduction -- In This Chapter We Will Cover -- What Makes a Good PRNG? -- Desirable Properties of Pseudorandom Numbers -- Tests of Randomness -- 1-D Test -- Equidistribution -- Runs Test -- Test for Longest Run of 1s -- Poker Test -- Statistical Tests -- Chi-Squared Test -- Standards for PRNG -- Specific Algorithms -- Mid-Square -- Linear Congruential Generator -- Lagged Fibonacci Generators -- Lehmer Algorithm -- Mersenne Twister -- Blum Blum Shub -- Yarrow -- Fortuna -- DUAL_EC_DRBG. The Marsaglia CD ROM -- Improving PRNGs -- Shuffling -- Cryptographic Hash -- Conclusions -- Test Your Knowledge -- References -- Chapter 13: SSL/TLS -- Introduction -- In This Chapter We Will Cover -- Digital Signatures -- Direct Signature -- Arbitrated Digital Signature -- Blind Signatures -- Digital Certificates -- X.509 -- Specific Types of X.509 Certificates -- PGP -- Alternate Certificate Types -- Public Key Infrastructure X.509 -- SSL and TLS -- History -- The Handshake Step by Step -- Handshake Initiation -- Applications of SSL/TLS -- OpenSSL -- VoIP -- Email -- Web Servers -- Apache Web Server -- IIS -- Conclusions -- Test Your Knowledge -- References -- Chapter 14: Virtual Private Networks, Authentication, and Wireless Security -- Introduction -- In This Chapter We Will Cover -- Concepts -- Authentication -- CHAP -- EAP -- LEAP -- EAP-TLS -- PEAP -- EAP-POTP -- Kerberos -- SESAME -- NTLM -- PPTP -- PPTP Authentication -- PPTP Encryption -- L2TP -- IPSec -- IKE Phase 1 -- Main Mode -- Aggressive Mode -- IKE Phase 2 -- VPN Gateways and Concentrators -- SSL/TLS -- Other Secure Communications -- SSH -- Wi-Fi Encryption -- WEP -- WPA -- WPA2 -- WPA3 -- Conclusions -- Test Your Knowledge -- References -- Chapter 15: Military Applications -- Introduction -- In This Chapter We Will Cover -- NSA and Cryptography -- Security Classifications -- NSA Cryptographic Standards -- Type 1 Products -- HAIPE-IS -- HAVE QUICK -- SINCGARS -- Type 2 Products -- Fortezza Plus -- Fishbowl -- Type 3 and 4 Products -- Suite A -- SAVILLE -- BATON -- FIREFLY -- Suite B -- The Modern Role of the NSA -- Secure Phones -- US Cryptography Laws and Regulations -- How Do Other Nations Handle Cryptography? -- International Regulations and Agreements -- COCOM and Wassenaar -- Specific Governments -- Cryptography and Malware -- Weaponized Malware -- Cyber Warfare -- TOR. TOR Technical Details. |
| Record Nr. | UNISA-996495559603316 |
Easttom Chuck
|
||
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Modern Cryptography : Applied Mathematics for Encryption and Information Security / / by William Easttom
| Modern Cryptography : Applied Mathematics for Encryption and Information Security / / by William Easttom |
| Autore | Easttom Chuck |
| Edizione | [2nd ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (460 pages) |
| Disciplina | 005.8 |
| Collana | Computer Science Series |
| Soggetto topico |
Telecommunication
Data structures (Computer science) Information theory Number theory Data protection Computational intelligence Statistics Communications Engineering, Networks Data Structures and Information Theory Computational Number Theory Data and Information Security Computational Intelligence Applied Statistics |
| ISBN |
9783031123047
9783031123030 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800’s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography. |
| Record Nr. | UNINA-9910624391103321 |
Easttom Chuck
|
||
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Modern cryptography : applied mathematics for encryption and information security / / William Easttom
| Modern cryptography : applied mathematics for encryption and information security / / William Easttom |
| Autore | Easttom Chuck |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (XIX, 390 p. 161 illus., 85 illus. in color.) |
| Disciplina | 621.3 |
| Soggetto topico |
Electrical engineering
Data structures (Computer science) |
| ISBN | 3-030-63115-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800’s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography. |
| Record Nr. | UNINA-9910484532303321 |
Easttom Chuck
|
||
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
System forensics, investigation, and response / / Chuck Easttom
| System forensics, investigation, and response / / Chuck Easttom |
| Autore | Easttom Chuck |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014 |
| Descrizione fisica | 1 online resource (390 pages) : illustrations |
| Disciplina | 363.25/968 |
| Collana | Jones & Bartlett Learning Information Systems Security & Assurance Series |
| Soggetto topico | Computer crimes - Investigation |
| ISBN | 1-284-03108-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The system forensics landscape. Introduction to forensics ; Overview of computer crime ; Forensics methods and labs -- Technical overview: system forensics tools, techniques, and methods. Collecting, seizing, and protecting evidence ; Understanding techniques for hiding and scrambling information ; Recovering data ; E-mail forensics -- Windows forensics ; Linux forensics ; Macintosh forensics ; Mobile forensics ; Performing network analysis -- Incident response and resources. Incident and intrusion response ; Trends and future directions ; System forensics resources. |
| Record Nr. | UNINA-9910165026903321 |
Easttom Chuck
|
||
| Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Windows Forensics : Understand Analysis Techniques for Your Windows / / by Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer
| Windows Forensics : Understand Analysis Techniques for Your Windows / / by Chuck Easttom, William Butler, Jessica Phelan, Ramya Sai Bhagavatula, Sean Steuber, Karely Rodriguez, Victoria Indy Balkissoon, Zehra Naseer |
| Autore | Easttom Chuck |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 |
| Descrizione fisica | 1 online resource (484 pages) |
| Disciplina | 5,268 |
| Altri autori (Persone) |
ButlerWilliam
PhelanJessica Sai BhagavatulaRamya SteuberSean RodriguezKarely Indy BalkissoonVictoria NaseerZehra |
| Soggetto topico |
Microsoft software
Microsoft .NET Framework Microsoft |
| ISBN | 979-88-6880-193-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Introduction to Windows -- Chapter 2: Forensics Concepts -- Chapter 3: Creating Forensic Images Using OSForensics, FTK Imager, and Autopsy -- Chapter 4: Windows File Artifacts -- Chapter 5: Windows Registry Part 1 -- Chapter 6: Windows Registry Part 2 -- Chapter 7: Windows Shadow Copy -- Chapter 8: Windows Memory Forensics -- Chapter 9: PowerShell Forensics -- Chapter 10: Web Browser Forensics -- Chapter 11: Windows Email Forensics -- Chapter 12: Microsoft Azure and Cloud Forensics -- Chapter 13: Data-Hiding Techniques in Windows -- Appendix A: Volatility Cheat Sheet -- Appendix B: Windows Registry Cheat Sheet. |
| Record Nr. | UNINA-9910865263503321 |
Easttom Chuck
|
||
| Berkeley, CA : , : Apress : , : Imprint : Apress, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||