This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the…mehr
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Behrouz Zolfaghari has received his Ph.D. in computer engineering from Amirkabir University of Technology, Tehran, Iran. He has done three postdocs at Indian Institute of Technology (Guwahati), University of Guelph (Ontario, Canada) and Waseda University, Tokyo, Japan. He is currently working as an assistant professor at Osaka University, Japan. His book has been ranked as the best book of all time in the world in the area of cryptographic hardware. He has won the ScienceFather Best Researcher award for his books in Cryptography. Hamid R. Nemati is a Professor of Information Systems at the Information Systems and Supply Chain Management Department of The University of North Carolina at Greensboro. He holds a doctorate degree in Information Technology and Management Science from the University of Georgia and a Master of Business Administration from The University of Massachusetts. He has extensive professional experience a developer and an analyst and has consulted with a number of major corporations. Before coming to UNCG, he was on the faculty of J. Mack Robinson College of Business Administration at Georgia State University. Dr. Nemati is internationally recognized for his research in behavioral aspects of Information Technology development and use. He is the founding Editor-in-Chief of International Journal of Information Security and Privacy and the Editor-in-Chief of the Information Security and Privacy Book Series. He has published ten books and over 130 peer reviewed academic publications in various scholarly and professional journals and conference proceedings. He has been the PI or Co-PI on several grant projects totaling over $450,000. Noteworthy among them are grants awarded for studying the implication of the use of information technology in prevention of interpersonal violence specifically domestic and child abuse and a grant awarded by the UNC System to the University of North Carolina at Greensboro for the development of three Post Baccalaureate Certificate Programs in Information Technology, Information Assurance, Security and Privacy and Logistic and Supply Chain Management. He was the director of MSITM, where during his tenure; he revised the curriculum, increased student enrollment and introduced new programs. Dr. Nemati is an award winning teacher and has extensive experience teaching various aspects of information technology. He has developed and taught over 30 new courses including courses in software application programming and web development, cybersecurity, information security, database development, knowledge management and data analytics. He has mentored undergraduate, graduate and doctoral students on various research projects including independent projects, theses and dissertations. He has mentored over twenty doctoral students and has been the academic advisor to over 100 graduate students and has supervised over 70 graduate research projects. To date, his research collaborations with his students has resulted in one published book and over 40 refereed research articles. Naoto Yanai joined Osaka University as an assistant professor in 2014. He has been working as an associate professor in Osaka University since 2021. He is the head of the Information Security Engineering lab in graduate school of information science and Technology. His research area includes many aspects of information security from theoretical analysis based on mathematics to the vulnerability analysis of state-of-the-art technologies. He is working on the design of novel security technologies by leveraging the analysis results to prevent the latest cyberattacks. Khodakhast Bibak is an Assistant Professor at the Department of Computer Science and Software Engineering at Miami University. Previously, he was a Postdoctoral Research Associate (September 2017 - August 2018) in the Coordinated Science Laboratory at the University of Illinois at Urbana-Champaign. Before this, he was a Postdoctoral Research Fellow(May-August 2017) at the Department of Computer Science, University of Victoria, from where he also received his PhD (April 2017). Prior to that, he obtained a Master of Mathematics degree (April 2013) at the Department of Combinatorics & Optimization, University of Waterloo, where he was also a member of the Centre for Applied Cryptographic Research (CACR). Khodakhast's research interests are Cybersecurity, Applied Cryptography, Quantum Information Science (QIS), Artificial Intelligence, and the related areas.
Inhaltsangabe
Introduction.- The Cross-Impact between Cryptography and Artificial Intelligence.- II Past: War and Peace.- The Dichotomy of Crypto and NN.- III Present: Coevolution.- AI Makes Crypto Evolve.- Crypto Makes AI Evolve.- IV From a Dichotomy to a Trichotomy- Quantum Computing: The Third Vertex of the Triangle.- Chaotic Image Encryption: State-of-the-Art, Ecosystem and the Promise of Quantum-Inspired AI.- Information-Theoretic Cryptography: Life Cycle, Ecosystem and the Promise of Quantum-Inspired AI.- Further Works.- Conclusion.
Introduction.- The Cross-Impact between Cryptography and Artificial Intelligence.- II Past: War and Peace.- The Dichotomy of Crypto and NN.- III Present: Coevolution.- AI Makes Crypto Evolve.- Crypto Makes AI Evolve.- IV From a Dichotomy to a Trichotomy- Quantum Computing: The Third Vertex of the Triangle.- Chaotic Image Encryption: State-of-the-Art, Ecosystem and the Promise of Quantum-Inspired AI.- Information-Theoretic Cryptography: Life Cycle, Ecosystem and the Promise of Quantum-Inspired AI.- Further Works.- Conclusion.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497