Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively - so br...Lees meer
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the ...Lees meer
Rijndael was the surprise winner of the contest for the new Advanced En cryption Standard (AES) for the United States. This contest was organized and ...Lees meer
The Tamarin prover is an open-source analysis tool for cryptographic protocols. Given a specification of a protocol, possible adversaries, and the des...Lees meer
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Lees meer
Hardware-intrinsic security is a young field dealing with secure secret key storage. This book features contributions from researchers and practitione...Lees meer
The opening section of this book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols. Essential tec...Lees meer
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...Lees meer
This is the first book dedicated to modern steganography and steganalysis. The author offers a proposal to structure approaches to provably secure ste...Lees meer
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze-...Lees meer
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Lees meer
This volume provides a detailed account of block cipher analysis, design, and deployment. The authors describe the most prominent block ciphers and gi...Lees meer
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...Lees meer
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic...Lees meer
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applic...Lees meer
This book describes the essential components of the SCION secure Internet architecture, the first architecture designed foremost for strong security a...Lees meer
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, counterme...Lees meer
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BL...Lees meer
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use stron...Lees meer
This book establishes, for the first time, the potential application of NC O implementations to cryptographic primitives such as one-way functions, ps...Lees meer
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...Lees meer
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security ...Lees meer
This book covers fault analysis in secret key cryptography, from side-channel analysis and its relevance to fault attacks, to block ciphers, counterme...Lees meer
Cryptographic protocols are the backbone of secure digital interactions, but achieving both security and efficiency is a challenging balancing act. Th...Lees meer