Dragon Bytes


Book Description




Decoding the Virtual Dragon


Book Description

This work expands on "Dragon Bytes", the author's earlier work on Chinese information warfare (IW) activities from 1999-2003. It explains how Chinese IW concepts since 2003 fit into the strategic outlook practices, and activities of the People's Liberation Army (PLA). It offers IW explanations directly from the pens of Chinese experts. The Chinese authors discuss the application or relation of IW to strategic thought, the transformation plans of the People's Liberation Army (PLA), the revolution in military affairs (RMA), and the revolution in knowledge warfare and cognition.







Byte


Book Description




New Stream Cipher Designs


Book Description

This state-of-the-art survey presents the outcome of the eSTREAM Project, which was launched in 2004 as part of ECRYPT, the European Network of Excellence in Cryptology (EU Framework VI). The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be either very fast in software or very resource-efficient in hardware. Algorithm designers were invited to submit new stream cipher proposals to eSTREAM, and 34 candidates were proposed from around the world. Over the following years the submissions were assessed with regard to both security and practicality by the cryptographic community, and the results were presented at major conferences and specialized workshops dedicated to the state of the art of stream ciphers. This volume describes the most successful of the submitted designs and, over 16 chapters, provides full specifications of the ciphers that reached the final phase of the eSTREAM project. The book is rounded off by two implementation surveys covering both the software- and the hardware-oriented finalists.




Information Security and Cryptology - ICISC 2004


Book Description

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communication of Korea.




Military Review


Book Description







Chinese Cybersecurity and Defense


Book Description

Cyberdefense has become, over the past five years, a major issue on the international scene. China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity. The United States is building their cyberdefense strategy against what they call the "Chinese threat." It is therefore important to better understand today's challenges related to cyber dimension in regard of the rise of China. Contributions from international researchers provide cross perspectives on China, its strategies and policies for cybersecurity and cyberdefense. These issues have now gained major strategic dimension: Is Cyberspace changing the scene of international relations? How China does apprehend cybersecurity and cyberdefense? What are the issues, challenges? What is the role of China in the global cyberspace?




The Logic of Irregular War


Book Description

For the United States, asymmetric warfare has emerged as the “new normal.” The large-scale conventional campaigns that typified U.S. military engagements for much of the 20th Century are increasingly things of the past. Instead, the quarter-century since the end of the Cold War and the collapse of the U.S.-Soviet balance of power has seen irregular war truly come of age, with more and more hostile nations pursuing asymmetric means in order to secure the strategic advantage vis-à-vis the United States. In this volume, a group of leading national security practitioners and subject matter experts comes together to analyze the asymmetric strategies being pursued today by America’s main state-based adversaries—Russia, China, Iran and North Korea—and to explore how U.S. policymakers can respond more effectively to them.