This book provides an overview of state-of-the-art implementations of quantum random number generators (QRNGs), and especially examines their relation to classical statistical randomness models and numerical techniques for computing random numbers. The reader - who ideally has a background in classical statistics, computer science, or cryptography - is introduced to the world of quantum bits st…
Table of Contents Part I Considering the Typical User Mind Your SMSes: Mitigating Social Engineering in Second Factor Authentication Permissions and Privacy Privacy and Tracking Part II Considering the Malicious User A Framework for Analysis Attackers’ Accounts Environmentally and Politically Conscious Crypto Part III Designing Solutions Based on Typical and Malicious Users So…
Table of contents About the Authors About the Technical Reviewer Acknowledgments Part I. Foundations 1. Getting Started in Cryptography and Cryptanalysis 2. Cryptography Fundamentals 3. Mathematical Background and Its Applicability 4. Large Integer Arithmetic 5. Floating-Point Arithmetic 6. New Features in C++20 7. Secure Coding Guidelines 8. Cryptography Libraries in C/C++20 P…
This book focuses on control units, which are a vital part of modern digital systems, and responsible for the efficiency of controlled systems. The model of a finite state machine (FSM) is often used to represent the behavior of a control unit. As a rule, control units have irregular structures that make it impossible to design their logic circuits using the standard library cells. Design metho…
This book focuses on lattice-based cryptosystems, widely considered to be one of the most promising post-quantum cryptosystems and provides fundamental insights into how to construct provably secure cryptosystems from hard lattice problems. The concept of provable security is used to inform the choice of lattice tool for designing cryptosystems, including public-key encryption, identity-based e…
Table of Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2…
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies…
This comprehensive book examines a range of examples, prepared by a diverse group of academic and industry practitioners, which demonstrate how cloud-based simulation is being extensively used across many disciplines, including cyber-physical systems engineering. This book is a compendium of the state of the art in cloud-based simulation that instructors can use to inform the next generation. I…
The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestsellin…
Table of contents 1. Getting Started 2. Loading and Adding 3. Tooling Up 4. Controlling Program Flow 5. Thanks for the Memories 6. Functions and the Stack 7. Linux Operating System Services 8. Programming GPIO Pins 9. Interacting with C and Python 10. Interfacing with Kotlin and Swift 11. Multiply, Divide, and Accumulate 12. Floating-Point Operations 13. Neon Coprocessor 14. Opt…