000 03469nam a22006015i 4500
001 978-981-99-7081-0
003 DE-He213
005 20240207153802.0
007 cr nn 008mamaa
008 231214s2023 si | s |||| 0|eng d
020 _a9789819970810
_9978-981-99-7081-0
050 4 _aQ342
072 7 _aUYQ
_2bicssc
072 7 _aTEC009000
_2bisacsh
072 7 _aUYQ
_2thema
082 0 4 _a006.3
_223
100 1 _aShandilya, Shishir Kumar.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 2 _aA Nature-Inspired Approach to Cryptology
_h[electronic resource] /
_cby Shishir Kumar Shandilya, Agni Datta, Atulya K. Nagar.
250 _a1st ed. 2023.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2023.
300 _aXXIII, 309 p. 18 illus., 10 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v1122
500 _aAcceso multiusuario
505 0 _aIntroduction to Nature Inspired Algorithms -- Cryptography Background and Primitives -- Genetic Cryptography -- Neural Cryptography -- DNA based Cryptography -- Optimization of Cryptosystems using Nature Inspired Algorithms -- Bio-inspired Lightweight Approaches to Cryptography -- Chaos Cryptography.
520 _aThis book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.
541 _fUABC ;
_cPerpetuidad
650 0 _aComputational intelligence.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aAlgorithms.
650 1 4 _aComputational Intelligence.
650 2 4 _aCryptology.
650 2 4 _aAlgorithms.
700 1 _aDatta, Agni.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aNagar, Atulya K.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819970803
776 0 8 _iPrinted edition:
_z9789819970827
776 0 8 _iPrinted edition:
_z9789819970834
830 0 _aStudies in Computational Intelligence,
_x1860-9503 ;
_v1122
856 4 0 _zLibro electrónico
_uhttp://libcon.rec.uabc.mx:2048/login?url=https://doi.org/10.1007/978-981-99-7081-0
912 _aZDB-2-INR
912 _aZDB-2-SXIT
942 _cLIBRO_ELEC
999 _c263504
_d263503