Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
We gebruiken cookies om:
De website vlot te laten werken, de beveiliging te verbeteren en fraude te voorkomen
Inzicht te krijgen in het gebruik van de website, om zo de inhoud en functionaliteiten ervan te verbeteren
Je op externe platformen de meest relevante advertenties te kunnen tonen
Je cookievoorkeuren
Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book presents a comprehensive mathematical theory that explains precisely what information flow is, how it can be assessed quantitatively - so br...Lees meer
Fault-tolerant distributed consensus is a fundamental concept, both in cryptography as well as distributed computing. Ever since the inception of the ...Lees meer
The author won the ACM Doctoral Dissertation Award (2000) for the best Ph.D. thesis in Electrical Engineering & Computer Science, and this book is bas...Lees meer
AES/Rijndael (Advanced Encryption Standard) will replace the (former) Data Encryption Standard (DES) as the standard technology for digital data encry...Lees meer
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Lees meer
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of th...Lees meer
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable ...Lees meer
Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly contradictory de?nition; ze-...Lees meer
In today's world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confiden...Lees meer
The opening section of this book covers key concepts of cryptography, from encryption and digital signatures to cryptographic protocols. Essential tec...Lees meer
Block ciphers encrypt blocks of plaintext, messages, into blocks of ciphertext under the action of a secret key, and the process of encryption is reve...Lees meer
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confiden...Lees meer
Hash functions are the cryptographer's Swiss Army knife. Even though they play an integral part in today's cryptography, existing textbooks discuss ha...Lees meer
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic...Lees meer
This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BL...Lees meer
In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in s...Lees meer
Describes one of the most promising future Internet architectures Focuses on the development of a working prototype Suitable for practitioners, resear...Lees meer
Computational aspects of geometry of numbers have been revolutionized by the Lenstra-Lenstra-Lovasz ´ lattice reduction algorithm (LLL), which has led...Lees meer
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use stron...Lees meer
Locally computable (NC 0 ) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of the...Lees meer
This is the first comprehensive and integrated treatment of key establishment protocols. It is aimed mainly at researchers and security professionals,...Lees meer
Securing exam systems is necessary to ensure fairness and meritocracy in modern societies Author introduces a novel approach to securing exam systems ...Lees meer
Research over the last two decades has considerably expanded knowledge of Internet cryptography, revealing the important interplay between standardiza...Lees meer
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of the...Lees meer