Listing 1 - 10 of 35 | << page >> |
Sort by
|
Choose an application
"Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures.Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation.About the first edition:It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms; clearly written sections describing most of the major types of cryptosystems....This book is an excellent reference, and I believe it would also be a good textbook for a course for mathematics or computer science majors..." [Neal Koblitz, The American Mathematical Monthly]
cryptografie --- Information systems --- Cryptography --- Coding theory --- Mathematics --- Physical Sciences & Mathematics --- Algebra --- Coding theory. --- Cryptography. --- Codage --- Criptographie --- Cryptographie --- Number theory. --- Data structures (Computer science). --- Number Theory. --- Data Structures and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Number study --- Numbers, Theory of
Choose an application
A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.
Data protection -- Government policy -- European Union countries. --- Internet -- Security measures -- Government policy -- European Union countries. --- Privacy, Right of -- European Union countries. --- Law, Politics & Government --- Human Rights --- Privacy, Right of. --- Internet --- Law and legislation --- Law and legislation. --- Cyberspace --- Invasion of privacy --- Privacy, Right of --- Right of privacy --- Engineering. --- Information technology. --- Business --- Computer graphics. --- Mass media. --- Law. --- Electrical engineering. --- Social sciences. --- Communications Engineering, Networks. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Social Sciences, general. --- IT in Business. --- Media Law. --- Data processing. --- Civil rights --- Libel and slander --- Personality (Law) --- Press law --- Computer crimes --- Confidential communications --- Data protection --- Right to be forgotten --- Secrecy --- Telecommunication. --- Computer vision. --- Mass media --- IT Law, Media Law, Intellectual Property. --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Behavioral sciences --- Human sciences --- Sciences, Social --- Social science --- Social studies --- Civilization --- Machine vision --- Vision, Computer --- Artificial intelligence --- Image processing --- Pattern recognition systems --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Optical data processing. --- Business—Data processing. --- Optical computing --- Visual data processing --- Bionics --- Electronic data processing --- Integrated optics --- Photonics --- Computers --- Electric engineering --- Engineering --- Acts, Legislative --- Enactments, Legislative --- Laws (Statutes) --- Legislative acts --- Legislative enactments --- Jurisprudence --- Legislation --- Media, Mass --- Media, The --- Optical equipment
Choose an application
Das Internet durchdringt alle Lebensbereiche: Gesundheitsversorgung, Bildung, Unterhaltung, Produktion, Logistik, Verkauf, den Finanzsektor, die öffentliche Verwaltung aber auch kritische Infrastrukturen wie Verkehr, Energieversorgung und Kommunikationsnetze. Kryptographie ist eine zentrale Technik für die Absicherung des Internets. Ohne Kryptographie gibt es im Internet keine Sicherheit. Kryptographie entwickelt sich ständig weiter und ist ein hochaktuelles Forschungsgebiet. Dieses Kryptographiebuch ist geschrieben für Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der modernen Kryptographie, zum Beispiel Verschlüsselung und digitale Signaturen. Das Buch vermittelt auf elementare Weise alle mathematischen Grundlagen, die zu einem präzisen Verständnis der Kryptographie nötig sind, mit vielen Beispielen und Übungen. Die Leserinnen und Leser dieses Buches erhalten ein fundiertes Verständnis der modernen Kryptographie und werden in die Lage versetzt Forschungsliteratur zur Kryptographie zu verstehen.
Number theory. --- Combinatorics. --- Data encryption (Computer science). --- Coding theory. --- Information theory. --- Number Theory. --- Cryptology. --- Coding and Information Theory.
Choose an application
Das Internet durchdringt alle Lebensbereiche: Gesundheitsversorgung, Bildung, Unterhaltung, Produktion, Logistik, Verkauf, den Finanzsektor, die öffentliche Verwaltung aber auch kritische Infrastrukturen wie Verkehr, Energieversorgung und Kommunikationsnetze. Kryptographie ist eine zentrale Technik für die Absicherung des Internets. Ohne Kryptographie gibt es im Internet keine Sicherheit. Kryptographie entwickelt sich ständig weiter und ist ein hochaktuelles Forschungsgebiet. Dieses Kryptographiebuch ist geschrieben für Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der modernen Kryptographie, zum Beispiel Verschlüsselung und digitale Signaturen. Das Buch vermittelt auf elementare Weise alle mathematischen Grundlagen, die zu einem präzisen Verständnis der Kryptographie nötig sind, mit vielen Beispielen und Übungen. Die Leserinnen und Leser dieses Buches erhalten ein fundiertes Verständnis der modernen Kryptographie und werden in die Lage versetzt Forschungsliteratur zur Kryptographie zu verstehen. Aus den Rezensionen zur 2. Auflage: „Diese von einem Mathematiker geschriebene „Einführung in die Kryptographie" fällt sofort durch ihren präzisen und logisch einwandfreien Stil auf. Die verwendeten Begriffe (Verschlüsselungsverfahren, perfekte Sicherheit, Hashfunktion,...) werden mathematisch sauber und kurz definiert, und es wird sehr wohl unterschieden, was „bewiesen" ist [...] und was „allgemeiner Glaube der Experten" ist. Trotz dieser mathematischen Genauigkeit ist dieses Buch insbesondere für Anfänger und speziell auch für Nicht-Mathematiker sehr verständlich gehalten. Das nötige mathematische Werkzeug (Restklassenringe, Matrizen und lineare Abbildungen, Wahrscheinlichkeit, Erzeugung von Primzahlen, Faktorisierungsverfahren, Ausblick auf elliptische Kurven) wird vor der jeweiligen Anwendung vorgestellt. Dann wird der Themenkreis prägnant, sehr verständlich und mit Beispielen illustriert, besprochen, wobei der Geübte die dahinterliegende mathematische Idee schnell erkennen kann. Dabei werden im Wesentlichen alle Basistechniken der modernen Kryptographie erfasst. Soweit möglich bzw. üblich, wird das englische Fachvokabular der Kryptographie in die deutsche Sprache übersetzt. Ich hoffe, dass die Freude des Rezensenten beim Lesen dieses Buches auch von vielen anderen Lesern ebenfalls empfunden werden kann." (Int. Math. Nachrichten 2002, Vol 56, Issue 189). „[...] „Klein, aber fein" ist das Charakteristikum des Buches: Jeder Abschnitt ist mit (für Mathematiker) sehr anschaulichen Beispielen und kleinen Übungsaufgaben versehen. Entwickler finden hier eine reiche Quelle der Hintergründe, die sie für eine Implementation wissen müssen." (Amazon.de-Redaktion) .
Choose an application
Das Internet ist eine der bedeutendsten technologischen Errungenschaften der Geschichte. Es erlaubt Menschen in aller Welt Zugang zu umfassenden Informationen, unterstützt die weltweite Kommunikation und Vernetzung und fungiert als globaler Marktplatz. Dabei bieten die vielfältigen Angebote im Internet jedoch nicht nur Chancen; sie werfen auch Fragen des Datenschutzes, der Persönlichkeitsentfaltung und der Privatsphäre auf. Dieses Phänomen wird gemeinhin als das Privatheitsparadoxon bezeichnet. Aufgrund der großen Bedeutung von Privatheit im Internet hat acatech 2011 ein Projekt initiiert, das sich mit dem Privatheitsparadoxon wissenschaftlich auseinandersetzt. Dieser Band ist der erste Teil einer acatech STUDIE zum Projekt „Internet Privacy – Eine Kultur der Privatsphäre und des Vertrauens im Internet“. Die Autoren leisten eine Bestandsaufnahme der existierenden individuellen und gesellschaftlichen Vorstellungen von Privatsphäre im Internet sowie der entsprechenden rechtlichen, technischen, ökonomischen und ethischen Rahmenbedingungen. The development of the Internet is one of the most significant technological advances in history. It allows people around the world access to comprehensive information, supports worldwide communication and interaction and functions as a global marketplace. While users appreciate the services offered by the internet, they are also worried about their privacy. This is sometimes referred to as the privacy paradox of the Internet. In 2011 acatech launched a project that is developing recommendations for the creation of a culture of privacy and trust that will be able to resolve this paradox. This multidisciplinary analysis presents the desires and fears of users and society regarding Internet privacy as well as these sentiments’ ethical, economic, technical and legal frameworks. This publication is the first of two volumes, revealing the findings of the project “Internet Privacy – A Culture of Privacy and Trust on the Internet”.
Computers and civilization. --- Social sciences. --- Information technology. --- Business—Data processing. --- Mass media. --- Law. --- Computers and Society. --- Social Sciences, general. --- IT in Business. --- IT Law, Media Law, Intellectual Property. --- Privacy, Right of. --- Internet.
Choose an application
"Quantum algorithms are among the most important, interesting, and promising innovations in information and communication technology. They pose a major threat to today’s cybersecurity and at the same time promise great benefits by potentially solving previously intractable computational problems with reasonable effort. The theory of quantum algorithms is based on advanced concepts from computer science, mathematics, and physics. Introduction to Quantum Algorithms offers a mathematically precise exploration of these concepts, accessible to those with a basic mathematical university education, while also catering to more experienced readers. This comprehensive book is suitable for self-study or as a textbook for one or two-semester introductory courses on quantum computing algorithms. Instructors can tailor their approach to emphasize theoretical understanding and proofs or practical applications of quantum algorithms, depending on the course’s goals and timeframe. "--Provided by publisher.
Quantum computing. --- Computer algorithms. --- Quantum computers.
Choose an application
This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients a, b, c, the mathem- ical theories that permit the solution of these problems, and applications to cryptography. A considerable part of the theory is developed for forms with real coe?cients and it is shown that forms with integer coe?cients appear in a natural way. Much of the progress of number theory has been stimulated by the study of concrete computational problems. Deep theories were developed from the classic time of Euler and Gauss onwards to this day that made the solutions ofmanyof theseproblemspossible.Algorithmicsolutionsandtheirproperties became an object of study in their own right. Thisbookintertwinestheexpositionofoneveryclassicalstrandofnumber theory with the presentation and analysis of algorithms both classical and modern which solve its motivating problems. This algorithmic approach will lead the reader, we hope, not only to an understanding of theory and solution methods, but also to an appreciation of the e?ciency with which solutions can be reached. The computer age has led to a marked advancement of algorithmic - search. On the one hand, computers make it feasible to solve very hard pr- lems such as the solution of Pell equations with large coe?cients. On the other, the application of number theory in public-key cryptography increased the urgency for establishing the complexity of several computational pr- lems: many a computer system stays only secure as long as these problems remain intractable.
Forms, Binary. --- Forms, Quadratic. --- Quadratic forms --- Diophantine analysis --- Forms, Binary --- Number theory --- Binary forms --- Algebra. --- Number theory. --- Computer science. --- Data encryption (Computer science). --- Number Theory. --- Mathematics of Computing. --- Cryptology. --- Mathematics --- Mathematical analysis --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Number study --- Numbers, Theory of --- Algebra --- Computer science—Mathematics.
Choose an application
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures. Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and the Associate Editor of the Journal of Cryptology. In 1985, he received the Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. Furthermore, he has received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. About the first edition: It is amazing how much Buchmann is able to do in under 300 pages: self-contained explanations of the relevant mathematics (with proofs); a systematic introduction to symmetric cryptosystems, including a detailed description and discussion of DES; a good treatment of primality testing, integer factorization, and algorithms for discrete logarithms; clearly written sections describing most of the major types of cryptosystems....This book is an excellent reference, and I believe it would also be a good textbook for a course for mathematics or computer science majors..." -Neal Koblitz, The American Mathematical Monthly.
Coding theory --- Cryptography --- Codage --- Cryptographie --- 519.76 --- 519.711 --- 519.72 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- General questions of control theory. Models. Modelling. Coding. Theory of nets --- Information theory: mathematical aspects --- 519.72 Information theory: mathematical aspects --- 519.711 General questions of control theory. Models. Modelling. Coding. Theory of nets --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- Number theory. --- Data structures (Computer science). --- Number Theory. --- Data Structures and Information Theory. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Number study --- Numbers, Theory of --- Algebra
Choose an application
Number theory --- Algebra --- Computer science --- Computer. Automation --- algebra --- DES (data encryption standard) --- informatica --- wiskunde --- getallenleer
Choose an application
A thorough multidisciplinary analysis of various perspectives on internet privacy was published as the first volume of a study, revealing the results of the achatech project "Internet Privacy - A Culture of Privacy and Trust on the Internet." The second publication from this project presents integrated, interdisciplinary options for improving privacy on the Internet utilising a normative, value-oriented approach. The ways in which privacy promotes and preconditions fundamental societal values and how privacy violations endanger the flourishing of said values are exemplified. The conditions which must be fulfilled in order to achieve a culture of privacy and trust on the internet are illuminated. This volume presents options for policy-makers, educators, businesses and technology experts how to facilitate solutions for more privacy on the Internet and identifies further research requirements in this area.
Human sciences (algemeen) --- Social sciences (general) --- Law --- Telecommunication technology --- Applied physical engineering --- Mass communications --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- computervisie --- mediarecht --- bedrijfseconomie --- grafische vormgeving --- massamedia --- sociale wetenschappen --- wetgeving --- cultuurwetenschap --- informatiesystemen --- tekstverwerking --- informatica management --- ingenieurswetenschappen --- communicatietechnologie
Listing 1 - 10 of 35 | << page >> |
Sort by
|