1-20
of
5,302
results
-
Quantum Security Simplified: S...âš¡ Step into the future of security. This book unveils the revolutionary impa... âš¡ Step into the future of security. This book unveils the revolutionary impact of quantum computing on the digital world and shows how businesses leaders and professionals can safeguard their future with clarity confidence and practical steps. more
-
Post-Quantum Security Engineer...Most books about cryptography quietly assume you still have time. This one doe... Most books about cryptography quietly assume you still have time. This one doesn t. We are entering a moment where the mathematical foundations behind digital trust-RSA and ECC-are no longer safe assumptions but time-limited dependencies. Every... more
-
Becoming Quantum Safe: Protect...A practical guide to navigating cryptographic challenges in the era of quantum... A practical guide to navigating cryptographic challenges in the era of quantum computing. Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive pragmatic guide designed for... more
-
Physical-Layer Security Quantu...The growth of data-driven technologies 5G and the Internet place enormous pres... The growth of data-driven technologies 5G and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However the security of both optical and... more
-
Books on Tech Post-quantum Cry...A must-read for researchers professionals and anybody else interested in cyber... A must-read for researchers professionals and anybody else interested in cybersecurity in the era of quantum computing is Postquantum Cryptography: Defending Against Quantum Threats. Traditional cryptography techniques could be vulnerable as quantum... more
-
The Quantum-Ready Architect: B...Quantum computers aren t here to ruin your week... yet. But the cryptography p... Quantum computers aren t here to ruin your week... yet. But the cryptography protecting today s internet? A lot of it comes with an expiration date. If you build or run modern systems post-quantum cryptography (PQC) isn t a future problem. It s a... more
-
Physical-Layer Security Quantu...This book introduces the reader to the most advanced topics of physical-layer ... This book introduces the reader to the most advanced topics of physical-layer security (PLS) cryptography covert/stealth communications and quantum key distribution (QKD) also known as the quantum cryptography and post-quantum cryptography (PQC). So... more
-
The Advanced Handbook of Post-...Post-quantum cryptography migration starts here. Post-quantum cryptography is ... Post-quantum cryptography migration starts here. Post-quantum cryptography is no longer a distant research concern. If your organization depends on RSA elliptic-curve cryptography TLS PKI HSMs code signing VPNs identity systems cloud key management... more
-
Pre-Owned The Physics of Quant...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
The Physics of Quantum Informa...Information is stored transmitted and processed by physical means. Thus the co... Information is stored transmitted and processed by physical means. Thus the concept of information and computation can be formulated in the con- text of a physical theory and the study of information requires ultimately experimentation. This... more
-
Finitely Presented Groups: Wit...This book contains surveys and research articles on the state-of-the-art in fi... This book contains surveys and research articles on the state-of-the-art in finitely presented groups for researchers and graduate students. Overviews of current trends in exponential groups and of the classification of finite triangle groups and... more
-
Lecture Notes in Computer Scie...The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings o... The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop PQCrypto 2024 held in Oxford UK during June 12-14 2024. The 28 full papers included in these proceedings were carefully reviewed and... more
-
Post-Quantum Cryptography: 4th...Post-Quantum Cryptography: 4th International Workshop PQCrypto 2011 Taipei Tai... Post-Quantum Cryptography: 4th International Workshop PQCrypto 2011 Taipei Taiwan November 29-December 2 2011 Proceedings more
-
The Ciso s Next Frontier: Ai P...This book provides an advanced understanding of cyber threats as well as the r... This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing mitigating or remediating those threats and risks.... more
-
Practical Cryptography: From C...Practical Cryptography: From Classical Ciphers to Post-Quantum Standards is a ... Practical Cryptography: From Classical Ciphers to Post-Quantum Standards is a hands-on introduction to modern cryptography designed for students developers and security practitioners who want to understand how cryptographic systems work in practice.... more
-
Managing Post-Quantum Cryptogr...Every encrypted transaction your organization relies on today - every financia... Every encrypted transaction your organization relies on today - every financial transfer patient record classified message and identity verification - rests on mathematical assumptions that a sufficiently powerful quantum computer will break. As... more
-
Pre-Owned Post-Quantum Cryptog...Quantum computers will break the security of almost all the public-key cryptos... Quantum computers will break the security of almost all the public-key cryptosystems used in practice. This book focus on two classes of cryptography that can resist these emerging attacks. In the first part we introduce coding theory and give an... more
-
Post-Quantum Cryptography (Pap...This book constitutes the refereed proceedings of the Second International Wor... This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography PQCrypto 2008 held in Cincinnati OH USA in October 2008. The 15 revised full papers presented were carefully reviewed and selected from... more
-
Lecture Notes in Computer Scie...This book constitutes the refereed proceedings of the 14th International Works... This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography PQCrypto 2022 held in College Park MD USA in August 14-18 2023. The 25 full papers presented in this book were carefully reviewed and... more
-
Post-Quantum Cryptography (Pap...Quantum computers will break the security of almost all the public-key cryptos... Quantum computers will break the security of almost all the public-key cryptosystems used in practice. This book focus on two classes of cryptography that can resist these emerging attacks. In the first part we introduce coding theory and give an... more
Ads related to post quantum cryptography research