View All Book Series

Chapman & Hall/CRC Cryptography and Network Security Series

9 Series Titles


Practical Mathematical Cryptography

Practical Mathematical Cryptography

1st Edition

By Kristian Gjøsteen
August 26, 2024

Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography. Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential ...

Secret History The Story of Cryptology

Secret History: The Story of Cryptology

1st Edition

By Craig Bauer
August 26, 2024

The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the ...

Techniques for Designing and Analyzing Algorithms

Techniques for Designing and Analyzing Algorithms

1st Edition

By Douglas R. Stinson
August 26, 2024

Techniques for Designing and Analyzing Algorithms Design and analysis of algorithms can be a difficult subject for students due to its sometimes-abstract nature and its use of a wide variety of mathematical tools. Here the author, an experienced and successful textbook writer, makes the subject as...

Introduction to Modern Cryptography

Introduction to Modern Cryptography

3rd Edition

By Jonathan Katz, Yehuda Lindell
December 21, 2020

Now the most used texbook for introductory cryptography courses in both mathematics and computer science, the Third Edition builds upon previous editions by offering several new sections, topics, and exercises. The authors present the core principles of modern cryptography, with emphasis on formal ...

Communication System Security

Communication System Security

1st Edition

By Lidong Chen, Guang Gong
May 29, 2012

Helping current and future system designers take a more productive approach in the field, Communication System Security shows how to apply security principles to state-of-the-art communication systems. The authors use previous design failures and security flaws to explain common pitfalls in ...

Handbook on Soft Computing for Video Surveillance

Handbook on Soft Computing for Video Surveillance

1st Edition

Edited By Sankar K. Pal, Alfredo Petrosino, Lucia Maddalena
January 25, 2012

Information on integrating soft computing techniques into video surveillance is widely scattered among conference papers, journal articles, and books. Bringing this research together in one source, Handbook on Soft Computing for Video Surveillance illustrates the application of soft computing ...

Cryptanalysis of RSA and Its Variants

Cryptanalysis of RSA and Its Variants

1st Edition

By M. Jason Hinek
July 21, 2009

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known ...

Algorithmic Cryptanalysis

Algorithmic Cryptanalysis

1st Edition

By Antoine Joux
June 15, 2009

Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code ...

Introduction to Network Security

Introduction to Network Security

1st Edition

By Douglas Jacobson
November 18, 2008

Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or ...

AJAX loader