Listing 1 - 10 of 16 | << page >> |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.
Coding theory --- Cryptography --- Codage --- Cryptographie --- Congresses. --- Congrès --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Algebra --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Computer science --- Computer Science. --- Coding and Information Theory. --- Data Encryption. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Computer Communication Networks. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics
Choose an application
Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more.
Coding theory --- Cryptography --- Codage --- Cryptographie --- Mathematics --- Mathématiques --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Mathématiques --- Mathematics. --- Coding theory. --- Codificació, Teoria de la. --- Criptografia --- Matemàtica. --- Escriptura secreta --- Escriptura xifrada --- Esteganografia --- Escriptura --- Simbolisme --- Símbols --- Xifratge (Informàtica) --- Xifres i claus --- Teoria de la codificació --- Dades --- Electrònica digital --- Informació, Teoria de la --- Màquines, Teoria de --- Senyal, Teoria del (Telecomunicació) --- Programació (Ordinadors) --- Compressió (Informàtica) --- Compressió (Telecomunicació) --- Teoria de la informació --- Compressió de dades (Telecomunicació) --- Compressió de dades (Informàtica)
Choose an application
The 11th IMA Conference on Cryptography and Coding was held at the Royal Agricultural College, Cirencester, UK during December 18-20, 2007. As usual, the venue provided a relaxed and convivial atmosphere for attendees to enjoy the conference programme and discuss current and future research ideas. Theprogrammecomprisedthreeinvitedtalksand22contributedpapers.The invited speakers were Jonathan Katz (University of Maryland, USA), Patrick Sol´e(EcolePolytechniquedel'Universit´ e de Nice-Sophia Antipolis, France) and Whit Di?e (Sun Microsystems, USA). Special thanks are due to these speakers. Twooftheinvitedspeakersprovidedpapers,includedinthisvolume,whichhi- light the connections between cryptography, coding theory and discrete mat- matics. The contributed talks were selected from 48 submissions. The accepted - pers cover a range of topics in mathematics and computer science, including symmetric and public key cryptography, Boolean functions, sequences, e?cient implementation and side-channel analysis. I would like to thank all the people who helped with the conference p- gramme and organization. First, I thank the Steering Committee for their gu- ance on the general format of the conference and for suggestions of members of the Programme Committee. I also heartily thank the Programme Committee andthe sub-reviewerslistedonthe followingpages fortheir thoroughnessduring the reviewprocess. Eachpaper wasreviewed by at least three people. There was signi?cant online discussion about a number of papers. The submission and review process was greatly simpli?ed by the ichair so- ware developed by Thomas Baign` eresand Matthieu Finiasz. Thanks also to Jon HartforrunningthesubmissionsWebserverandSriramSrinivasanfordesigning and maintaining the conference Web page.
Ergodic theory. Information theory --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- coderen --- DES (data encryption standard) --- cryptografie --- discrete wiskunde --- informatica --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
Data encryption (Computer science) --- Xifratge (Informàtica)
Choose an application
The 11th IMA Conference on Cryptography and Coding was held at the Royal Agricultural College, Cirencester, UK during December 18-20, 2007. As usual, the venue provided a relaxed and convivial atmosphere for attendees to enjoy the conference programme and discuss current and future research ideas. Theprogrammecomprisedthreeinvitedtalksand22contributedpapers.The invited speakers were Jonathan Katz (University of Maryland, USA), Patrick Sol´e(EcolePolytechniquedel'Universit´ e de Nice-Sophia Antipolis, France) and Whit Di?e (Sun Microsystems, USA). Special thanks are due to these speakers. Twooftheinvitedspeakersprovidedpapers,includedinthisvolume,whichhi- light the connections between cryptography, coding theory and discrete mat- matics. The contributed talks were selected from 48 submissions. The accepted - pers cover a range of topics in mathematics and computer science, including symmetric and public key cryptography, Boolean functions, sequences, e?cient implementation and side-channel analysis. I would like to thank all the people who helped with the conference p- gramme and organization. First, I thank the Steering Committee for their gu- ance on the general format of the conference and for suggestions of members of the Programme Committee. I also heartily thank the Programme Committee andthe sub-reviewerslistedonthe followingpages fortheir thoroughnessduring the reviewprocess. Eachpaper wasreviewed by at least three people. There was signi?cant online discussion about a number of papers. The submission and review process was greatly simpli?ed by the ichair so- ware developed by Thomas Baign` eresand Matthieu Finiasz. Thanks also to Jon HartforrunningthesubmissionsWebserverandSriramSrinivasanfordesigning and maintaining the conference Web page.
Ergodic theory. Information theory --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- coderen --- DES (data encryption standard) --- cryptografie --- discrete wiskunde --- informatica --- computerbeveiliging --- computernetwerken --- informatietheorie
Choose an application
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
Mathematical logic --- Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- algebra --- DES (data encryption standard) --- cryptografie --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- programmatielogica
Choose an application
Choose an application
Choose an application
Choose an application
This book constitutes the thoroughly refereed proceedings of the Second International Conference on Pairing-Based Cryptography, Pairing 2008, held in London, UK, in September 2008. The 20 full papers, presented together with the contributions resulting from 3 invited talks, were carefully reviewed and selected from 50 submissions. The contents are organized in topical sections on cryptography, mathematics, constructing pairing-friendly curves, implementation of pairings, and hardware implementation.
Computer security --- Cryptography --- Data encryption (Computer science). --- Computer science. --- Computer software. --- Computational complexity. --- Data structures (Computer scienc. --- Algebra --- Cryptology. --- Programming Techniques. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Data Structures and Information Theory. --- Symbolic and Algebraic Manipulation. --- Data processing. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Software, Computer --- Computer systems --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer programming. --- Algorithms. --- Computer science—Mathematics. --- Data structures (Computer science). --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Algorism --- Arithmetic --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Foundations --- Programming --- Sets of pairs of functions to be distinguished --- Functions to be distinguished, Sets of pairs of --- Pairs of functions to be distinguished, Sets of --- SPFDs (Sets of pairs of functions to be distinguished) --- Set theory
Listing 1 - 10 of 16 | << page >> |
Sort by
|