[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

[图书][B] An introduction to cryptography

RA Mollin - 2006 - taylorfrancis.com
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides
a solid foundation in cryptographic concepts that features all of the requisite background …

A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field

N Siddiqui, F Yousaf, F Murtaza, M Ehatisham-ul-Haq… - Plos one, 2020 - journals.plos.org
Cryptography is commonly used to secure communication and data transmission over
insecure networks through the use of cryptosystems. A cryptosystem is a set of cryptographic …

[HTML][HTML] Data mining for cyber biosecurity risk management–A comprehensive review

DD Shankar, AS Azhakath, N Khalil, J Sajeev… - Computers & …, 2023 - Elsevier
The world is currently facing the era of Cyberbiosecurity, also known as Biocybersecurity, or
Digital Biosecurity, which poses a few unique security vulnerabilities. A significant …

[图书][B] A classical introduction to cryptography: Applications for communications security

S Vaudenay - 2005 - books.google.com
A Classical Introduction to Cryptography: Applications for Communications Security
introduces fundamentals of information and communication security by providing …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

S-box construction based on linear fractional transformation and permutation function

LC Nizam Chew, ES Ismail - Symmetry, 2020 - mdpi.com
Substitution boxes (S-box) with strong and secure cryptographic properties are widely used
for providing the key property of nonlinearity in block ciphers. This is critical to be resistant to …

The design of S-boxes by simulated annealing

JA Clark, JL Jacob, S Stepney - New Generation Computing, 2005 - Springer
Substitution boxes (S-boxes) are important components in many modern-day symmetric key
ciphers. Their study has attracted a great deal of attention over many years. The emergence …

LRBC: a lightweight block cipher design for resource constrained IoT devices

A Biswas, A Majumdar, S Nath, A Dutta… - Journal of Ambient …, 2023 - Springer
The internet of things (IoT) is now an in-demand technology that has been adopted in
various applications and includes various embedded devices, sensors and other objects …