LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Coding theory & cryptology

See below for a selection of the latest books from Coding theory & cryptology category. Presented with a red border are the Coding theory & cryptology books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Coding theory & cryptology books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Tribe of Hackers Blue Team

Tribe of Hackers Blue Team

Author: Marcus J. Carey, Jennifer Jin Format: Paperback / softback Release Date: 03/11/2020

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

Mastering Corda

Mastering Corda

Author: Jamiel Sheikh Format: Paperback / softback Release Date: 31/10/2020

As a decentralized ledger platform, Corda shares several characteristics with blockchain. But Corda's design serves large enterprises, especially financials such as insurance, trading, and trade finance that require data privacy and permissioned participants. With this book, beginners and blockchain veterans will learn how Corda works as well as how to build real-world decentralized applications--or CordApps. Right now, Corda is experiencing strong growth and adoption, both for its free open source version and for the commercial version, Corda Enterprise. Jamiel Sheikh, founder and CEO of Chainhaus, guides you through: Corda's proposition and alignment with enterprise strategy Corda architecture and blockchain fundamentals A comparison of Ethereum, HyperLedger, and Corda Hands-on development of a CordaApp Example use cases in trading, asset tokenization, and supply chain management

Guide to Pairing-Based Cryptography

Guide to Pairing-Based Cryptography

Author: Nadia El Mrabet Format: Paperback / softback Release Date: 30/09/2020

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.

Blockchain Technology and Applications

Blockchain Technology and Applications

Author: Pethuru (IBM Pvt.Ltd., Manyata Tech Park, Bangolore, India) Raj Format: Hardback Release Date: 17/09/2020

Blockchain is emerging as a powerful technology, which has attracted the wider attention of all businesses across the globe. In addition to financial businesses, IT companies and business organizations are keenly analyzing and adapting this technology for improving business processes. Security is the primary enterprise application. There are other crucial applications that include creating decentralized applications and smart contracts, which are being touted as the key differentiator of this pioneering technology. The power of any technology lies in its ecosystem. Product and tool vendors are building and releasing a variety of versatile and robust toolsets and platforms in order to speed up and simplify blockchain application development, deployment and management. There are other infrastructure-related advancements in order to streamline blockchain adoption. Cloud computing, big data analytics, machine and deep learning algorithm, and connected and embedded devices all are driving blockchain application development and deployment. Blockchain Technology and Applications illustrates how blockchain is being sustained through a host of platforms, programming languages, and enabling tools. It examines: Data confidential, integrity, and authentication Distributed consensus protocols and algorithms Blockchain systems design criteria and systems interoperability and scalability Integration with other technologies including cloud and big data It also details how blockchain is being blended with cloud computing, big data analytics and IoT across all industry verticals. The book gives readers insight into how this path-breaking technology can be a value addition in several business domains ranging from healthcare, financial services, government, supply chain and retail.

Boolean Functions for Cryptography and Coding Theory

Boolean Functions for Cryptography and Coding Theory

Author: Claude Carlet Format: Hardback Release Date: 31/08/2020

Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and all important results, building on the author's influential articles with additional topics and recent results. A useful resource for researchers and graduate students, the book balances detailed discussions of properties and parameters with examples of various types of cryptographic attacks that motivate the consideration of these parameters. It provides all the necessary background on mathematics, cryptography, and coding, and an overview on recent applications, such as side channel attacks on smart cards, cloud computing through fully homomorphic encryption, and local pseudo-random generators. The result is a complete and accessible text on the state of the art in single and multiple output Boolean functions that illustrates the interaction between mathematics, computer science, and telecommunications.

Codebreakers

Codebreakers

Author: Bengt Beckman Format: Hardback Release Date: 16/08/2020

One of the greatest accomplishments in the history of cryptography occurred in 1940 when a Swedish mathematician broke the German code used for strategic military communications. This story has all the elements of a classic thriller: a desperate wartime situation; a moody and secretive mathematical genius with a talent for cryptography; and, a stunning mathematical feat, mysterious to this day. Arne Beurling, the man who inherited Einstein's office at Princeton's Institute for Advanced Study, was the figure who played this role at a crucial moment in world history. Though the cracking of the code from the Geheimschreiber (G-Schreiber) device is every bit as impressive as the breaking of the Enigma code by the Poles and English, this secret has been kept for over 50 years!Through the eyes of a former head of Sweden's signal intelligence organization, Bengt Beckman, the reader will learn about the events leading up to the breakthrough and make the acquaintance of not only a remarkable mathematician, but also a remarkable human being. Arne Beurling was a leading international figure who achieved beautiful results in mathematical analysis. By the arrival of World War II, he was one of the most powerful and original mathematicians in the world and widely considered a genius. During his military service, he demonstrated a flair for code and was well known within Swedish cryptology circles. The natural choice of the Swedish intelligence service was to place Beurling at the center of the group charged with breaking the G-Schreiber code. His single-handed effort 'broke the unbreakable'. Using only teleprinter tapes and cipher text, he deciphered the code that the Germans believed impossible to crack - in two weeks! The feat, in a word, was astonishing.Many wonder how he did it. But Beurling took his secret to the grave, retorting when asked, 'A magician does not reveal his secrets'. The author, Bengt Beckman, for many years was the head of the cryptanalysis department of the Swedish signal intelligence agency. In writing this book, he made extensive use of its archives. He also interviewed many people who participated in the Swedish wartime intelligence effort. He describes in detail Beurling's attack on the G-Schreiber system as well as attacks on several other wartime crypto systems, noting high points from the history of Swedish cryptology. The book will appeal to a broad audience of readers, from historians and biography buffs to mathematicians to anyone with a passing interest in cryptology and cryptanalysis. This English edition has been translated by Kjell-Ove Widman, Director of Sweden's Mittag-Leffler Institute. Also on cryptography and available from the AMS is Cryptography: An Introduction .

Applied Approach to Privacy and Security for the Internet of Things

Applied Approach to Privacy and Security for the Internet of Things

Author: Parag Chatterjee Format: Paperback / softback Release Date: 30/07/2020

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

How to Write Good Programs

How to Write Good Programs

Author: Perdita Stevens Format: Paperback / softback Release Date: 23/07/2020

Learning to program isn't just learning the details of a programming language: to become a good programmer you have to become expert at debugging, testing, writing clear code and generally unsticking yourself when you get stuck, while to do well in a programming course you have to learn to score highly in coursework and exams. Featuring tips, stories and explanations of key terms, this book teaches these skills explicitly. Examples in Python, Java and Haskell are included, helping you to gain transferable programming skills whichever language you are learning. Intended for students in Higher or Further Education studying early programming courses, it will help you succeed in, and get the most out of, your course, and support you in developing the software engineering habits that lead to good programs.

Code-Based Cryptography

Code-Based Cryptography

Author: Marco Baldi Format: Paperback / softback Release Date: 18/07/2020

This book constitutes the refereed and revised post-conference proceedings of the 8th International Workshop on Code-Based Cryptography, CBCrypto 2020, held in Zagreb, Croatia, in May 2020.*The seven papers presented in this book were carefully reviewed and selected from numerous submissions. These contributions focus on various topics such as code-based cryptography, from design to implementation, security, new systems, and improved decoding algorithms. * The conference was held virtually due to the COVID-19 pandemic.

Financial Cryptography and Data Security

Financial Cryptography and Data Security

Author: Joseph Bonneau Format: Paperback / softback Release Date: 18/07/2020

This book constitutes the thoroughly refereed post-conference proceedings of the 24th International Conference on Financial Cryptography and Data Security, FC 2020, held in Kota Kinabalu, Malaysia, in February 2020. The 34 revised full papers and 2 short papers were carefully selected and reviewed from 162 submissions. The papers are grouped in the following topical sections: attacks; consensus; cryptoeconomics; layer 2; secure computation; privacy; crypto foundations; empirical studies; and smart contracts.

Advances in Cryptology - EUROCRYPT 2020

Advances in Cryptology - EUROCRYPT 2020

Author: Anne Canteaut Format: Paperback / softback Release Date: 02/05/2020

The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.

Advances in Cryptology - EUROCRYPT 2020

Advances in Cryptology - EUROCRYPT 2020

Author: Anne Canteaut Format: Paperback / softback Release Date: 02/05/2020

The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic. The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.