Eight of the 16 papers were written by academics in Iraq, with editor Sadkhan Al Maliky co-authoring five of those papers. The collection surveys recent advance in cryptanalysis, cryptography, and cryptology for computer system security, and describes applications to image and speech encryption, wireless voice communications, and forensic analysis. Topics include methods for extracting encryption keys from volatile memory, an evaluation of spam filtering techniques, a thinning algorithm for fingerprint recognition, quantum key distribution networks, and an area-efficient composite field inverter for elliptic curve cryptosystems.
– ProtoView Book Abstracts (formerly Book News, Inc.)