1-80
of
436,720
results
-
Pre-Owned The Physics of Quant...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
The Physics of Quantum Informa...Information is stored transmitted and processed by physical means. Thus the co... Information is stored transmitted and processed by physical means. Thus the concept of information and computation can be formulated in the con- text of a physical theory and the study of information requires ultimately experimentation. This... more
-
Quantum Computing Quantum-Safe...Quantum computers have demonstrated that they have the inherent potential to o... Quantum computers have demonstrated that they have the inherent potential to outperform classical computers in many areas. One of the major impacts is that the currently available cryptography algorithms are bound to no longer hold once quantum... more
-
Quantum Security Simplified: S...âš¡ Step into the future of security. This book unveils the revolutionary impa... âš¡ Step into the future of security. This book unveils the revolutionary impact of quantum computing on the digital world and shows how businesses leaders and professionals can safeguard their future with clarity confidence and practical steps. more
-
Cryptography Algorithms: A gui...Build your real-world cryptography knowledge from understanding the fundamenta... Build your real-world cryptography knowledge from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity career Key Features: Learn modern algorithms such as zero-knowledge elliptic... more
-
Quantum Science and Technology...Quantum Cryptography: From Key Distribution to Conference Key Agreement Quantum Cryptography: From Key Distribution to Conference Key Agreement more
-
Quantum-Safe Cryptography: Pro...Quantum-Safe Cryptography: Protecting Data in a Quantum World addresses the im... Quantum-Safe Cryptography: Protecting Data in a Quantum World addresses the impending challenges posed by quantum computing to current cryptographic systems. As quantum technology progresses the potential to compromise classical encryption methods... more
-
Post-Quantum Security Engineer...Most books about cryptography quietly assume you still have time. This one doe... Most books about cryptography quietly assume you still have time. This one doesn t. We are entering a moment where the mathematical foundations behind digital trust-RSA and ECC-are no longer safe assumptions but time-limited dependencies. Every... more
-
Physical-Layer Security Quantu...The growth of data-driven technologies 5G and the Internet place enormous pres... The growth of data-driven technologies 5G and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However the security of both optical and... more
-
Quantum Information Theory: Th...Quantum information theory is a generalization of classical information theory... Quantum information theory is a generalization of classical information theory to use quantum-mechanical particles and interference. It is used in the study of quantum computation and quantum cryptography. more
-
Books on Tech Post-quantum Cry...A must-read for researchers professionals and anybody else interested in cyber... A must-read for researchers professionals and anybody else interested in cybersecurity in the era of quantum computing is Postquantum Cryptography: Defending Against Quantum Threats. Traditional cryptography techniques could be vulnerable as quantum... more
-
The Quantum-Ready Architect: B...Quantum computers aren t here to ruin your week... yet. But the cryptography p... Quantum computers aren t here to ruin your week... yet. But the cryptography protecting today s internet? A lot of it comes with an expiration date. If you build or run modern systems post-quantum cryptography (PQC) isn t a future problem. It s a... more
-
Becoming Quantum Safe: Protect...A practical guide to navigating cryptographic challenges in the era of quantum... A practical guide to navigating cryptographic challenges in the era of quantum computing. Becoming Quantum Safe: Implementing Post-Quantum Cryptography to Mitigate Risks and Protect Your Business is a is a definitive pragmatic guide designed for... more
-
Post-Quantum Cryptography Migr...Post-quantum cryptography is not a future upgrade. It is a structural migratio... Post-quantum cryptography is not a future upgrade. It is a structural migration of trust happening now beneath the surface of enterprise systems that continue to operate on borrowed certainty. This book confronts a dissonance most organizations... more
-
Physical-Layer Security Quantu...This book introduces the reader to the most advanced topics of physical-layer ... This book introduces the reader to the most advanced topics of physical-layer security (PLS) cryptography covert/stealth communications and quantum key distribution (QKD) also known as the quantum cryptography and post-quantum cryptography (PQC). So... more
-
Introduction to Quantum Comput...Unlock the power of quantum computing and explore the cutting-edge of technolo... Unlock the power of quantum computing and explore the cutting-edge of technology with Introduction to Quantum Computing: Code the Future. Dive into the revolutionary world where bits transform into qubits offering unparalleled processing... more
-
Quantum Machine Learning: Unlo...Chapter 1: Introduction to Quantum Machine Learning Overview of Quantum Comput... Chapter 1: Introduction to Quantum Machine Learning Overview of Quantum Computing The field of quantum computing is a rapidly evolving area of study that has the potential to revolutionize the world of artificial intelligence (AI) and machine... more
-
Large Spool Cap For Singer Qua...Lager Spool Cap 44mm For Singer Quantum LE Quantum XL10 Quantum XL100 Quantum ... Lager Spool Cap 44mm For Singer Quantum LE Quantum XL10 Quantum XL100 Quantum XL1000 Quantum XL150 Quantum XL5000 Quantum XL6000 SX SX100. more
-
Quantum Cryptography and Secre...Quantum cryptography (or quantum key distribution) is a state-of-the-art techn... Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum... more
-
Pre-Owned Theory of Quantum Co...This book constitutes the thoroughly refereed post-conference proceedings of t... This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation Communication and Cryptography TQC 2011 held in Madrid Spain in May 2011. The 14 revised papers presented were carefully... more
-
Quantum Cryptography Explained...Unlock the future of secure communications with Quantum Cryptography Explained... Unlock the future of secure communications with Quantum Cryptography Explained: Understand the Future of Secure Communications. In this groundbreaking book you ll dive deep into the exciting world of quantum cryptography a technology that promises... more
-
Hardware-Based Computer Securi...Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics... Hardware-Based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography more
-
Pre-Owned The Story of Codebre...The Story of Codebreaking: From Ancient Ciphers to Quantum Cryptography by Cim... The Story of Codebreaking: From Ancient Ciphers to Quantum Cryptography by Cimino Al more
-
The Essential History of Crypt...A book that tells the history of hiding messages. It begins with ancient metho... A book that tells the history of hiding messages. It begins with ancient methods of concealing meaning inside ordinary writing. The narrative follows the development of these techniques over many centuries showing their use by leaders and soldiers.... more
-
Lecture Notes in Computer Scie...The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings o... The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop PQCrypto 2024 held in Oxford UK during June 12-14 2024. The 28 full papers included in these proceedings were carefully reviewed and... more
-
Post-Quantum Cryptography: 4th...Post-Quantum Cryptography: 4th International Workshop PQCrypto 2011 Taipei Tai... Post-Quantum Cryptography: 4th International Workshop PQCrypto 2011 Taipei Taiwan November 29-December 2 2011 Proceedings more
-
Lecture Notes in Physics Appli...Using the quantum properties of single photons to exchange binary keys between... Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography - or better Quantum Key Distribution -... more
-
Holistic Approach to Quantum C...This new book discusses the concepts while also highlighting the challenges in... This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques in a single volume. It comprehensively covers important topics... more
-
The Ciso s Next Frontier: Ai P...This book provides an advanced understanding of cyber threats as well as the r... This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing mitigating or remediating those threats and risks.... more
-
Practical Cryptography: From C...Practical Cryptography: From Classical Ciphers to Post-Quantum Standards is a ... Practical Cryptography: From Classical Ciphers to Post-Quantum Standards is a hands-on introduction to modern cryptography designed for students developers and security practitioners who want to understand how cryptographic systems work in practice.... more
-
Managing Post-Quantum Cryptogr...Every encrypted transaction your organization relies on today - every financia... Every encrypted transaction your organization relies on today - every financial transfer patient record classified message and identity verification - rests on mathematical assumptions that a sufficiently powerful quantum computer will break. As... more
-
Cyber Security Using Modern Te...The main objective of this book is to introduce cyber security using modern te... The main objective of this book is to introduce cyber security using modern technologies like AI Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers... more
-
Theory of Quantum Computation ...This book constitutes the thoroughly refereed post-workshop proceedings of the... This book constitutes the thoroughly refereed post-workshop proceedings of the 4th Workshop on Theory of Quantum Computation Communication and Cryptography TQC 2009 held in Waterloo Canada in May 2009. The 10 revised papers presented were carefully... more
-
Quantum Cryptography (Hardcove...This paper recommends the U.S. Air Force develop an in depth understanding of ... This paper recommends the U.S. Air Force develop an in depth understanding of quantum mechanics and more specifically its application to cryptography. A survey of scientists and academic institutions conducting experiments to better understand and... more
-
The Code Book: The Science of ...In his first book since the bestselling Fermat s Enigma Simon Singh offers the... In his first book since the bestselling Fermat s Enigma Simon Singh offers the first sweeping history of encryption tracing its evolution and revealing the dramatic effects codes have had on wars nations and individual lives. From Mary Queen of... more
-
Pre-Owned Introduction to Quan...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in good condition. If you re not completely satisfied please get in touch & we ll be happy to help. ISBN-10: 1316515656 ISBN-13:... more
-
Encryption for Organizations a...Cryptography and encryption aren t just for geeks and spies--they re also part... Cryptography and encryption aren t just for geeks and spies--they re also part of our daily lives. This book enlightens you with the basics of digital cryptography and covers the must-do practices organizations need to implement when it comes to... more
-
Finitely Presented Groups: Wit...This book contains surveys and research articles on the state-of-the-art in fi... This book contains surveys and research articles on the state-of-the-art in finitely presented groups for researchers and graduate students. Overviews of current trends in exponential groups and of the classification of finite triangle groups and... more
-
Post-Quantum Cryptography: 9th...This book constitutes the refereed proceedings of the 9th International Worksh... This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography PQCrypto 2018 held in Fort Lauderdale FL USA in April 2018. The 24 revised full papers presented were carefully reviewed and selected from... more
-
Lecture Notes in Computer Scie...The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th ... The two-volume set LNCS 16491 + 16492 constitutes the proceedings of the 17th International Workshop on Post-Quantum Cryptography PQCrypto 2026 held in Saint Malo France during April 2026. The 27 full papers presented in the proceedings were... more
-
Post-Quantum Cryptography: 5th...Post-Quantum Cryptography: 5th International Workshop Pqcrypto 2013 Limoges Fr... Post-Quantum Cryptography: 5th International Workshop Pqcrypto 2013 Limoges France June 4-7 2013 Proceedings more
-
Mathematics for Industry Mathe...Mathematical Foundations for Post-Quantum Cryptography: Crypto-Math Crest Mathematical Foundations for Post-Quantum Cryptography: Crypto-Math Crest more
-
Coding Theory and Cryptography...The book contains surveys on the current state and the historical background o... The book contains surveys on the current state and the historical background of cryptography. It will be useful to mathematicians computer scientists and engineers as well as historians with an interest in cryptography. more
-
Quantum Computing Revolution: ...The future of computing is no longer theoretical it is unfolding right now and... The future of computing is no longer theoretical it is unfolding right now and it is called quantum computing. In a world driven by data speed and intelligence a new kind of machine is emerging one that does not simply calculate faster but redefines... more
-
Theory of Quantum Computation ...This book constitutes the thoroughly refereed post-conference proceedings of t... This book constitutes the thoroughly refereed post-conference proceedings of the 5th Conference on Theory of Quantum Computation Communication and Cryptography TQC 2010 held in Leeds UK in April 2010. The 15 revised papers presented were carefully... more
-
Pre-Owned Post-Quantum Cryptog...Post-Quantum Cryptography: 6th International Workshop Pqcrypto 2014 Waterloo O... Post-Quantum Cryptography: 6th International Workshop Pqcrypto 2014 Waterloo On Canada October 1-3 2014. Proceedings more
-
Post Quantum Cryptography (Har...Comprehensive Overview: Covers classical cryptography quantum threats and the ... Comprehensive Overview: Covers classical cryptography quantum threats and the foundations of post-quantum cryptographic algorithms. Diverse PQC Approaches: Explores lattice-based code-based multivariate and hash-based cryptography with detailed... more
-
Theory of Quantum Computation ...This book constitutes revised selected papers from the 7th Conference on Theor... This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation Communication and Cryptography TQC 2012 held in Tokyo Japan in May 2012. The 12 papers presented were carefully reviewed and selected for... more
-
New Frontiers in Cryptography:...This book provides comprehensive coverage of various Cryptography topics while... This book provides comprehensive coverage of various Cryptography topics while highlighting the most recent trends such as quantum blockchain lightweight Chaotic and DNA cryptography. Moreover this book covers cryptography primitives and its usage... more
-
Pre-Owned Post-Quantum Cryptog...This volume constitutes the proceedings of the 11th International Conference o... This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography PQCrypto 2020 held in Paris France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86... more
-
Post-Quantum Cryptography (Pap...This book constitutes the refereed proceedings of the Second International Wor... This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography PQCrypto 2008 held in Cincinnati OH USA in October 2008. The 15 revised full papers presented were carefully reviewed and selected from... more
-
Lecture Notes in Computer Scie...This book constitutes the refereed proceedings of the 14th International Works... This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography PQCrypto 2022 held in College Park MD USA in August 14-18 2023. The 25 full papers presented in this book were carefully reviewed and... more
-
Cryptography Algorithms - Seco...Master real-world cryptography with updated algorithms enhanced encryption tec... Master real-world cryptography with updated algorithms enhanced encryption techniques and modern defenses in this latest edition of Cryptographic Algorithms Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features: -... more
-
Cyber Security Using Modern Te...The main objective of this book is to introduce cyber security using modern te... The main objective of this book is to introduce cyber security using modern technologies like AI Quantum Cryptography and Blockchain. This unique and comprehensive solution for cyber security of modern networks will greatly benefit researchers... more
-
Post-Quantum Cryptography (Pap...Quantum computers will break the security of almost all the public-key cryptos... Quantum computers will break the security of almost all the public-key cryptosystems used in practice. This book focus on two classes of cryptography that can resist these emerging attacks. In the first part we introduce coding theory and give an... more
-
Holistic Approach to Quantum C...This new book discusses the concepts while also highlighting the challenges in... This new book discusses the concepts while also highlighting the challenges in the field of quantum cryptography and also covering cryptographic techniques and cyber security techniques in a single volume. It comprehensively covers important topics... more
-
The Ciso s Next Frontier: Ai P...This book provides an advanced understanding of cyber threats as well as the r... This book provides an advanced understanding of cyber threats as well as the risks companies are facing. It includes a detailed analysis of many technologies and approaches important to decreasing mitigating or remediating those threats and risks.... more
-
Cryptography and Quantum Compu...Scientific Study from the year 2004 in the subject Computer Science - Commerci... Scientific Study from the year 2004 in the subject Computer Science - Commercial Information Technology grade: A 4.00 course: Business language: English abstract: The dissertation will examine the nature of quantum computing and quantum cryptography... more
-
Lecture Notes in Physics Quant...Quantum Information Computation and Cryptography: An Introductory Survey of Th... Quantum Information Computation and Cryptography: An Introductory Survey of Theory Technology and Experiments more
-
Lecture Notes in Computer Scie...The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings o... The two-volume set LNCS 14771 and 14772 constitutes the refereed proceedings of the 15th International Workshop PQCrypto 2024 held in Oxford UK during June 12-14 2024. The 28 full papers included in these proceedings were carefully reviewed and... more
-
Lecture Notes in Physics Appli...Using the quantum properties of single photons to exchange binary keys between... Using the quantum properties of single photons to exchange binary keys between two partners for subsequent encryption of secret data is an absolutely novel te- nology. Only a few years ago quantum cryptography - or better Quantum Key Distribution -... more
-
Pre-Owned Codes The Science of...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
Pre-Owned The Code Book: The E...Our books are pre-loved which means they have been read before. We carefully c... Our books are pre-loved which means they have been read before. We carefully check all our books and believe them to be in a - USED - VERY GOOD Condition condition. If you re not completely satisfied please get in touch & we ll be happy to help.... more
-
Mathematics for Industry Inter...This open access book presents selected papers from International Symposium on... This open access book presents selected papers from International Symposium on Mathematics Quantum Theory and Cryptography (MQC) which was held on September 25-27 2019 in Fukuoka Japan. The international symposium MQC addresses the mathematics and... more
-
Post-Quantum Cryptography and ...The rise of quantum computing poses a major threat to traditional encryption m... The rise of quantum computing poses a major threat to traditional encryption methods potentially compromising the security of data that underpins critical smart city operations. As urban infrastructures increasingly rely on internet of things (IoT)... more
-
Post-Quantum Cryptography: 7th...This book constitutes the refereed proceedings of the 7th International Worksh... This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography PQCrypto 2016 held in Fukuoka Japan in February 2016. The 16 revised full papers presented were carefully reviewed and selected from 42... more
-
Pre-Owned Post-Quantum Cryptog...This book constitutes the refereed proceedings of the 9th International Worksh... This book constitutes the refereed proceedings of the 9th International Workshop on Post-Quantum Cryptography PQCrypto 2018 held in Fort Lauderdale FL USA in April 2018. The 24 revised full papers presented were carefully reviewed and selected from... more
-
Post-Quantum Cryptography: Thi...The recent development of quantum computing and quantum algorithmics has raise... The recent development of quantum computing and quantum algorithmics has raised important questions in cryptography. With Shor s algorithm (Peter W. Shor Polynomial-TimeAlgorithms for Prime Factorization and Discrete Lo- rithmsonaQuantumComputer... more
-
Pre-Owned Story Of Codebreakin...CONDITION – USED: Books sold are in GOOD or better condition. Good Condit... CONDITION – USED: Books sold are in GOOD or better condition. Good Condition: Minimal damage to the cover dust jacket may not be included minimal wear to binding most of the pages undamaged(e.g. minimal creases or tears) highlighting /... more
-
Post-Quantum Cryptography: 11t...This volume constitutes the proceedings of the 11th International Conference o... This volume constitutes the proceedings of the 11th International Conference on post-quantum cryptography PQCrypto 2020 held in Paris France in April 2020. The 29 full papers presented in this volume were carefully reviewed and selected from 86... more
-
Introduction to Quantum Crypto...This book offers an accessible and engaging introduction to quantum cryptograp... This book offers an accessible and engaging introduction to quantum cryptography assuming no prior knowledge in quantum computing. Essential background theory and mathematical techniques are introduced and applied in the analysis and design of... more
-
Pre-Owned Understanding Crypto...It s a preowned item in good condition and includes all the pages. It may have... It s a preowned item in good condition and includes all the pages. It may have some general signs of wear and tear such as markings highlighting slight damage to the cover minimal wear to the binding etc. but they will not affect the overall reading... more
-
Mathematics for Industry Inter...This open access book presents selected papers from International Symposium on... This open access book presents selected papers from International Symposium on Mathematics Quantum Theory and Cryptography (MQC) which was held on September 25-27 2019 in Fukuoka Japan. The international symposium MQC addresses the mathematics and... more
-
Pre-Owned Theory of Quantum Co...This book constitutes revised selected papers from the 7th Conference on Theor... This book constitutes revised selected papers from the 7th Conference on Theory of Quantum Computation Communication and Cryptography TQC 2012 held in Tokyo Japan in May 2012. The 12 papers presented were carefully reviewed and selected for... more
-
Harnessing Quantum Cryptograph...In an era where the escalating power of computers threatens the integrity of m... In an era where the escalating power of computers threatens the integrity of modern cryptographic systems the need for stronger more resilient security measures has never been more urgent. Quantum cryptography with its solid theoretical foundation... more
-
Implementing and Maintaining P...Implementing and Maintaining Post-Quantum Cryptography in an Organization is a... Implementing and Maintaining Post-Quantum Cryptography in an Organization is a practical no-hype playbook for getting your business ready for the next cryptographic shift-without outages forever pilots or vendor-driven confusion. Quantum computing... more
-
Lecture Notes in Computer Scie...This volume constitutes the proceedings of the 13th International Conference o... This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography PQCrypto 2022 held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected... more
-
Pre-Owned Quantum Cryptography...Quantum cryptography (or quantum key distribution) is a state-of-the-art techn... Quantum cryptography (or quantum key distribution) is a state-of-the-art technique that exploits properties of quantum mechanics to guarantee the secure exchange of secret keys. This 2006 text introduces the principles and techniques of quantum... more
-
Theory of Quantum Computation ...This book constitutes the thoroughly refereed post-conference proceedings of t... This book constitutes the thoroughly refereed post-conference proceedings of the 6th Conference on Theory of Quantum Computation Communication and Cryptography TQC 2011 held in Madrid Spain in May 2011. The 14 revised papers presented were carefully... more
Ads related to quantum cryptography snowflake