LoveReading

Becoming a member of the LoveReading community is free.

No catches, no fine print just unadulterated book loving, with your favourite books saved to your own digital bookshelf.

New members get entered into our monthly draw to win £100 to spend in your local bookshop Plus lots lots more…

Find out more

Coding theory & cryptology

See below for a selection of the latest books from Coding theory & cryptology category. Presented with a red border are the Coding theory & cryptology books that have been lovingly read and reviewed by the experts at Lovereading. With expert reading recommendations made by people with a passion for books and some unique features Lovereading will help you find great Coding theory & cryptology books and those from many more genres to read that will keep you inspired and entertained. And it's all free!

Hands-On Smart Contract Development with Solidity and Ethereum From Fundamentals to Deployment

Hands-On Smart Contract Development with Solidity and Ethereum From Fundamentals to Deployment

Author: Kevin Solorio, Randall Kanna, David H Hoover Format: Paperback / softback Release Date: 31/12/2019

Learn how to design, develop, and deploy smart contracts on the Ethereum blockchain. With this practical book, software developers with a high-level understanding of the blockchain will use the Solidity programming language to write decentralized applications (dApps) using the web3.js library. Smart contracts have allowed technologists to create a new breed of software systems that have ushered in the next revolution in human organization. Kevin Solorio, Randall Kanna, and David Hoover teach you the fundamentals of Solidity, as well as key topics such as unit testing, deployment, and preventing security vulnerabilities. You'll also learn how to leverage the built-in public/private key cryptography in the Ethereum protocol. Learn the fundamentals of how the Ethereum blockchain works Setup a local Ethereum client using Parity Develop and test secure smart contracts using Solidity and Vyper Learn how to deploy smart contracts Interact with your smart contract using Web3 (JavaScript) Work with hands-on examples and walkthroughs of common scenarios

A Practical Introduction to Regression Discontinuity Designs Foundations

A Practical Introduction to Regression Discontinuity Designs Foundations

In this Element and its accompanying second Element, A Practical Introduction to Regression Discontinuity Designs: Extensions, Matias Cattaneo, Nicolas Idrobo, and Rociio Titiunik provide an accessible and practical guide for the analysis and interpretation of regression discontinuity (RD) designs that encourages the use of a common set of practices and facilitates the accumulation of RD-based empirical evidence. In this Element, the authors discuss the foundations of the canonical Sharp RD design, which has the following features: (i) the score is continuously distributed and has only one dimension, (ii) there is only one cutoff, and (iii) compliance with the treatment assignment is perfect. In the second Element, the authors discuss practical and conceptual extensions to this basic RD setup.

Codebreakers Arne Beurling and the Swedish Crypto Program During World War II

Codebreakers Arne Beurling and the Swedish Crypto Program During World War II

Author: Bengt Beckman Format: Hardback Release Date: 11/12/2019

One of the greatest accomplishments in the history of cryptography occurred in 1940 when a Swedish mathematician broke the German code used for strategic military communications. This story has all the elements of a classic thriller: a desperate wartime situation; a moody and secretive mathematical genius with a talent for cryptography; and, a stunning mathematical feat, mysterious to this day. Arne Beurling, the man who inherited Einstein's office at Princeton's Institute for Advanced Study, was the figure who played this role at a crucial moment in world history. Though the cracking of the code from the Geheimschreiber (G-Schreiber) device is every bit as impressive as the breaking of the Enigma code by the Poles and English, this secret has been kept for over 50 years!Through the eyes of a former head of Sweden's signal intelligence organization, Bengt Beckman, the reader will learn about the events leading up to the breakthrough and make the acquaintance of not only a remarkable mathematician, but also a remarkable human being. Arne Beurling was a leading international figure who achieved beautiful results in mathematical analysis. By the arrival of World War II, he was one of the most powerful and original mathematicians in the world and widely considered a genius. During his military service, he demonstrated a flair for code and was well known within Swedish cryptology circles. The natural choice of the Swedish intelligence service was to place Beurling at the center of the group charged with breaking the G-Schreiber code. His single-handed effort 'broke the unbreakable'. Using only teleprinter tapes and cipher text, he deciphered the code that the Germans believed impossible to crack - in two weeks! The feat, in a word, was astonishing.Many wonder how he did it. But Beurling took his secret to the grave, retorting when asked, 'A magician does not reveal his secrets'. The author, Bengt Beckman, for many years was the head of the cryptanalysis department of the Swedish signal intelligence agency. In writing this book, he made extensive use of its archives. He also interviewed many people who participated in the Swedish wartime intelligence effort. He describes in detail Beurling's attack on the G-Schreiber system as well as attacks on several other wartime crypto systems, noting high points from the history of Swedish cryptology. The book will appeal to a broad audience of readers, from historians and biography buffs to mathematicians to anyone with a passing interest in cryptology and cryptanalysis. This English edition has been translated by Kjell-Ove Widman, Director of Sweden's Mittag-Leffler Institute. Also on cryptography and available from the AMS is Cryptography: An Introduction .

Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II

Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part II

Author: Dennis Hofheinz Format: Paperback / softback Release Date: 24/11/2019

The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I

Theory of Cryptography 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I

Author: Dennis Hofheinz Format: Paperback / softback Release Date: 23/11/2019

The two-volume set LNCS 11891 and 11892 constitutes the proceedings of the 17th International Conference on Theory of Cryptography, TCC 2019, held in Nuremberg, Germany, in December 2019.The 43 full papers presented were carefully reviewed and selected from 147 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings

Cryptography and Coding 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16-18, 2019, Proceedings

Author: Martin Albrecht Format: Paperback / softback Release Date: 17/11/2019

This book constitutes the proceedings of the 17th IMA International Conference on Cryptography and Coding, IMACC 2019, held in Oxford, UK, in December 2019. The 17 papers presented were carefully reviewed and selected from 31 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Progress in Cryptology - INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings

Progress in Cryptology - INDOCRYPT 2019 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings

Author: Feng Hao Format: Paperback / softback Release Date: 14/11/2019

This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019. The 28 revised full papers presented in this book were carefully reviewed and selected from 110 submissions (of which 20 were either rejected without being reviewed or withdrawn before the deadline). The focus of the conference includes works on signatures and filter permutators; symmetric key ciphers and hash functions; blockchain, secure computation and blind coupon mechanism; oblivious transfer, obfuscation and privacy amplification; Boolean functions, elliptic curves and lattices; algorithms, attacks and distribution; and efficiency, side-channel resistance and PUFs.

Advances in Cryptology - ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III

Advances in Cryptology - ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III

Author: Steven D. Galbraith Format: Paperback / softback Release Date: 12/11/2019

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Advances in Cryptology - ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I

Advances in Cryptology - ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I

Author: Steven D. Galbraith Format: Paperback / softback Release Date: 10/11/2019

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Advances in Cryptology - ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II

Advances in Cryptology - ASIACRYPT 2019 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II

Author: Steven D. Galbraith Format: Paperback / softback Release Date: 10/11/2019

The three-volume set of LNCS 11921,11922, and 11923 constitutes the refereed proceedings of the 25th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2019, held in Kobe, Japan, in December 2019. The 71 revised full papers presented were carefully reviewed and selected from 307 submissions. They are organized in topical sections on Lattices; Symmetric Cryptography; Isogenies; Obfuscation; Multiparty Computation; Quantum; E-cash and Blockchain; Codes; Authenticated Encryption; Multilinear Maps; Homomorphic Encryption; Combinatorial Cryptography; Signatures; Public Key Encryption; Side Channels; Functional Encryption; Zero Knowledge.

Codes The Guide to Secrecy From Ancient to Modern Times

Codes The Guide to Secrecy From Ancient to Modern Times

Author: Richard A. Mollin Format: Paperback / softback Release Date: 07/10/2019

From the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remaining accessible to the uninitiated while retaining enough rigor for the seasoned cryptologist. The book begins by tracing the development of cryptology from that of an arcane practice used, for example, to conceal alchemic recipes, to the modern scientific method that is studied and employed today. The remainder of the book explores the modern aspects and applications of cryptography, covering symmetric- and public-key cryptography, cryptographic protocols, key management, message authentication, e-mail and Internet security, and advanced applications such as wireless security, smart cards, biometrics, and quantum cryptography. The author also includes non-cryptographic security issues and a chapter devoted to information theory and coding. Nearly 200 diagrams, examples, figures, and tables along with abundant references and exercises complement the discussion. Written by leading authority and best-selling author on the subject Richard A. Mollin, Codes: The Guide to Secrecy from Ancient to Modern Times is the essential reference for anyone interested in this exciting and fascinating field, from novice to veteran practitioner.