Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively - so br...Lees meer
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the ...Lees meer
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the des...Lees meer
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...Lees meer
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Lees meer
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...Lees meer
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze-...Lees meer
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reve...Lees meer
The opening section of this book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols. Essential tec...Lees meer
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...Lees meer
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BL...Lees meer
Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led...Lees meer
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in s...Lees meer
Describes one of the most promising future Internet architectures Focuses on the development of a working prototype Suitable for practitioners, resear...Lees meer
Locally computable (NC 0 ) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of the...Lees meer
This is the first comprehensive and integrated treatment of key establishment protocols. It is aimed mainly at researchers and security professionals,...Lees meer
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use stron...Lees meer
Securing exam systems is necessary to ensure fairness and meritocracy in modern societies Author introduces a novel approach to securing exam systems ...Lees meer
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in s...Lees meer
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. Th...Lees meer
Everyone needs security: Nations need national security, corporations need corporate security, individuals need personal security, cybersecurity, AI s...Lees meer
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BL...Lees meer
This book investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos v...Lees meer
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure"...Lees meer