Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures
Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research
Part 1 - Introduction and System Engineering Chapter 1) Introduction Chapter 2) Software Process and Methodology Chapter 3) System Engineering Part 2 - Analysis and Architectural Design Chapter 4) Software Requirements Elicitation Chapter 5) Domain Modeling Chapter 6) Architectural Design Part 3 - Modeling and Design of Interactive Chapter 7) Deriving Use Cases from Requirements C…
Contents 1 Basic concepts and historical overview 2 Mathematical foundations of cryptography 3 Foundations of symmetric cryptography 4 Foundations of asymmetric cryptography 5 An electronic signature and hash functions 6 PGP Systems and truecrypt 7 Public key infrastructure 8 Cryptographic protocols 9 Cryptographic applications for network security
Contents Part one: Introduction and economics Chapter 1 Foundation Chapter 2 Technology (Introduction) Chapter 3 Economics Chapter 4 Business applications Part Two: Bitcoin technology Chapter 5 Public key cryptography Chapter 6 Transactions Chapter 7 The blockchain Chapter 8 Wallets Chapter 9 Mining Part Three: The cryptocurrencies landscape Chapter 10 The origins of bitcoin C…
Contents 1 Introduction 2 Cryptography basics 3 PKI building blocks 4 PKI management and security 5 PKI roles and responsibilities 6 Security considerations 7 Operational considerations 8 Incident management 9 PKI governance, risk, and compliance 10 Advanced PKI
Table of Contents Chapter 1 Advanced PHP techniques Chapter 2 Developing web applications Chapter 3 Advanced database concepts Chapter 4 Basic object-oriented programming Chapter 5 Advanced OOP Chapter 6 More advanced OOP Chapter 7 Design patterns Chapter 8 Using existing classes Chapter 9 Example-CMS with OOP Chapter 10 Networking with PHP Chapter 11 PHP and the server Chapter 12…
Contents Chapter 1 Indroduction Chapter 2 Literature background on steganography Chapter 3 Research methodology Chapter 4 Steganography samples Chapter 5 Steganalysis approach for steganography detection Chapter 6 Metadata analysis approach for steganography detection Chapter 7 Conclusions Chapter 8 Recommendations for further work
Contents 1 Introduction to block ciphers 2 Introduction to digital circuits 3 Handware implementation for block ciphers 4 Cryptanalysis on block ciphers 5 Side-channel analysis and fault analysis on block ciphers 6 Advanced fault analysis with techniques from cryptanalysis 7 Countermeasures against side-channel analysis and fault analysis