If These Halls Could Talk: A Historical Tour through San Francisco Recording Studios (Paperback)

Heather Johnson

  • 出版商: Course Technology
  • 出版日期: 2006-05-04
  • 定價: $900
  • 售價: 2.2$199
  • 語言: 英文
  • 頁數: 350
  • 裝訂: Paperback
  • ISBN: 1598631411
  • ISBN-13: 9781598631418
  • 相關分類: CiscoApple Developer

立即出貨(限量) (庫存=4)





Innovative Cryptography, second edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block ciphers, and details the need for fast symmetric ciphers for hardware (DES), software (RC5, Blowfish), and universal (AES, RC6, Twofish, IDEA, GOST) implementations.

In addition, the book covers the issues surrounding the development and design of software-oriented ciphers, including ciphers based on the algorithm formed depending on the secret key. Some specific issues related to the cryptographic strength of ciphers with the flexible algorithm of data transformation are considered, and a combinational-probabilistic model is suggested for obtaining minimal evaluations of the software ciphers being considered. A highly promising new command suggested to be used in universal processors is also discussed. This command executes controlled bit permutation, and is expected to sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type.

Innovative Cryptography, second edition is written for anyone involved in the development of cryptopgraphic tools, including engineers, researches, programmers, and IT security professionals.



  • Provides analysis and evaluation of the results of using controlled substitution-permutation networks (CSPNs) and permutation networks (PNs) for implementing data-dependent operations
  • Discusses the issue of introducing a new command into universal processors, which will sharply increase the performance of cryptographic algorithms including bit permutations of arbitrary type
  • Covers the mathematical basics of symmetric and asymmetric cryptography, including the systems of public key distribution and digital signatures
  • Explores new advances in the development of the practical approaches to the synthesis of block ciphers based on controlled transforms
  • Provides classification and description of mathematical properties of new cryptographic primitives
  • Presents cryptoschemes oriented toward effective use of data-dependent operations, a range of new fast block ciphers, and evaluates their resistance to cryptanalysis.


Table of Contents

Introduction; Chapter 1:Cryptography in the Information Age; Chapter 2: Flexible Software Ciphers; Chapter 3:Controlled Permutation; Chapter 4:Controlled Operational Substitutions; Chapter 5: Designing Fast Ciphers Based on Controlled Operations; Chapter 6: Elements of the Cryptanalysis of Ciphers Based on Controlled Operations; Conclusion; Glossary;References; Index