1-20
of
2,434
results
-
Quantum Security Simplified: S...âš¡ Step into the future of security. This book unveils the revolutionary impa... âš¡ Step into the future of security. This book unveils the revolutionary impact of quantum computing on the digital world and shows how businesses leaders and professionals can safeguard their future with clarity confidence and practical steps. more
-
Post-Quantum Security Engineer...Most books about cryptography quietly assume you still have time. This one doe... Most books about cryptography quietly assume you still have time. This one doesn t. We are entering a moment where the mathematical foundations behind digital trust-RSA and ECC-are no longer safe assumptions but time-limited dependencies. Every... more
-
Physical-Layer Security Quantu...The growth of data-driven technologies 5G and the Internet place enormous pres... The growth of data-driven technologies 5G and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However the security of both optical and... more
-
Becoming Quantum Safe: Protect...A practical guide to navigating cryptographic challenges in the era of quantum... A practical guide to navigating cryptographic challenges in the era of quantum computing. Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive pragmatic guide designed for... more
-
Post-Quantum Cryptography Migr...Post-quantum cryptography is not a future upgrade. It is a structural migratio... Post-quantum cryptography is not a future upgrade. It is a structural migration of trust happening now beneath the surface of enterprise systems that continue to operate on borrowed certainty. This book confronts a dissonance most organizations... more
-
Books on Tech Post-quantum Cry...A must-read for researchers professionals and anybody else interested in cyber... A must-read for researchers professionals and anybody else interested in cybersecurity in the era of quantum computing is Postquantum Cryptography: Defending Against Quantum Threats. Traditional cryptography techniques could be vulnerable as quantum... more
-
The Quantum-Ready Architect: B...Quantum computers aren t here to ruin your week... yet. But the cryptography p... Quantum computers aren t here to ruin your week... yet. But the cryptography protecting today s internet? A lot of it comes with an expiration date. If you build or run modern systems post-quantum cryptography (PQC) isn t a future problem. It s a... more
-
Physical-Layer Security Quantu...This book introduces the reader to the most advanced topics of physical-layer ... This book introduces the reader to the most advanced topics of physical-layer security (PLS) cryptography covert/stealth communications and quantum key distribution (QKD) also known as the quantum cryptography and post-quantum cryptography (PQC). So... more
-
Pre-Owned The Physics of Quant...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
The Physics of Quantum Informa...Information is stored transmitted and processed by physical means. Thus the co... Information is stored transmitted and processed by physical means. Thus the concept of information and computation can be formulated in the con- text of a physical theory and the study of information requires ultimately experimentation. This... more
-
Lecture Notes in Computer Scie...The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings o... The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop PQCrypto 2024 held in Oxford UK during June 12-14 2024. The 28 full papers included in these proceedings were carefully reviewed and... more
-
Post-Quantum Cryptography: 4th...Post-Quantum Cryptography: 4th International Workshop PQCrypto 2011 Taipei Tai... Post-Quantum Cryptography: 4th International Workshop PQCrypto 2011 Taipei Taiwan November 29-December 2 2011 Proceedings more
-
The Ciso s Next Frontier: Ai P...This book provides an advanced understanding of cyber threats as well as the r... This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing mitigating or remediating those threats and risks.... more
-
Practical Cryptography: From C...Practical Cryptography: From Classical Ciphers to Post-Quantum Standards is a ... Practical Cryptography: From Classical Ciphers to Post-Quantum Standards is a hands-on introduction to modern cryptography designed for students developers and security practitioners who want to understand how cryptographic systems work in practice.... more
-
Managing Post-Quantum Cryptogr...Every encrypted transaction your organization relies on today - every financia... Every encrypted transaction your organization relies on today - every financial transfer patient record classified message and identity verification - rests on mathematical assumptions that a sufficiently powerful quantum computer will break. As... more
-
Pre-Owned Post-Quantum Cryptog...This book constitutes the refereed proceedings of the 9th International Worksh... This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography PQCrypto 2018 held in Fort Lauderdale FL USA in April 2018. The 24 revised full papers presented were carefully reviewed and selected from... more
-
Post-Quantum Cryptography: Thi...The recent development of quantum computing and quantum algorithmics has raise... The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer... more
-
Pre-Owned Post-Quantum Cryptog...This volume constitutes the proceedings of the 11th International Conference o... This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography PQCrypto 2020 held in Paris France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86... more
-
Finitely Presented Groups: Wit...This book contains surveys and research articles on the state-of-the-art in fi... This book contains surveys and research articles on the state-of-the-art in finitely presented groups for researchers and graduate students. Overviews of current trends in exponential groups and of the classification of finite triangle groups and... more
-
Implementing and Maintaining P...Implementing and Maintaining Post-Quantum Cryptography in an Organization is a... Implementing and Maintaining Post-Quantum Cryptography in an Organization is a practical no-hype playbook for getting your business ready for the next cryptographic shift-without outages forever pilots or vendor-driven confusion. Quantum computing... more
Ads related to post quantum cryptography dao