Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions. The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students and researchers in the areas of theoretical computer science, discrete mathematics, engineering, and cryptology.
Mathematics --- Computer science --- Informatics --- Computer science. --- Data structures (Computer science). --- Computers. --- Computer mathematics. --- Computer Science. --- Data Structures, Cryptology and Information Theory. --- Theory of Computation. --- Mathematics of Computing. --- Computational Mathematics and Numerical Analysis. --- Mathematics. --- Science --- Data structures (Computer scienc. --- Information theory. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Communication theory --- Communication --- Cybernetics --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer science—Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Machine theory --- Calculators --- Cyberspace
Choose an application
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
Cooperating objects (Computer systems) --- Security measures. --- Data structures (Computer scienc. --- Data protection. --- Public safety. --- Data Structures and Information Theory. --- Security. --- Crime Control and Security. --- Security Science and Technology. --- Safety, Public --- Human services --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Data structures (Computer science). --- System safety. --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Prevention
Choose an application
Electrical engineering --- Mass communications --- Computer science --- Information systems --- DES (data encryption standard) --- cryptologie --- programmatielogica --- elektrische circuits --- communicatietechnologie
Choose an application
This book presents interesting, important unsolved problems in the mathematical and computational sciences. The contributing authors are leading researchers in their fields and they explain outstanding challenges in their domains, first by offering basic definitions, explaining the context, and summarizing related algorithms, theorems, and proofs, and then by suggesting creative solutions. The authors feel a strong motivation to excite deep research and discussion in the mathematical and computational sciences community, and the book will be of value to postgraduate students and researchers in the areas of theoretical computer science, discrete mathematics, engineering, and cryptology.
Mathematical control systems --- Mathematics --- Computer science --- Information systems --- Computer. Automation --- toegepaste informatica --- cryptologie --- computers --- informatica --- externe fixatie (geneeskunde --- wiskunde --- programmatielogica --- computerkunde --- informatietheorie
Choose an application
The chapters in this book present the work of researchers, scientists, engineers, and teachers engaged with developing unified foundations, principles, and technologies for cyber-physical security. They adopt a multidisciplinary approach to solving related problems in next-generation systems, representing views from academia, government bodies, and industrial partners, and their contributions discuss current work on modeling, analyzing, and understanding cyber-physical systems.
Social problems --- Criminology. Victimology --- Law --- Production management --- Information systems --- Computer. Automation --- veiligheid (mensen) --- informatica --- criminaliteit --- informatietechnologie --- computerbeveiliging
Choose an application
Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.
cryptologie --- elektrische circuits --- Information systems --- Electrical engineering --- programmatielogica --- Computer science --- DES (data encryption standard) --- communicatietechnologie --- Mass communications --- Data encryption (Computer science) --- Embedded computer systems --- Cryptography. --- Chiffrement (Informatique) --- Systèmes enfouis (Informatique) --- Cryptographie --- Design and construction --- Conception et construction --- EPUB-LIV-FT LIVINGEN SPRINGER-B --- Cryptography --- 004.056.55 --- cryptografie --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- data-encryptie
Choose an application
This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey, in September 2014. The 9 revised full papers and 43 invited talks presented were carefully reviewed and selected from 27 submissions. This workshop is a forum of mathematicians, computer scientists, engineers and physicists performing research on finite field arithmetic, interested in communicating the advances in the theory, applications, and implementations of finite fields. The workshop will help to bridge the gap between the mathematical theory of finite fields and their hardware/software implementations and technical applications.
Computer Science. --- Symbolic and Algebraic Manipulation. --- Discrete Mathematics in Computer Science. --- Algorithm Analysis and Problem Complexity. --- Data Encryption. --- Computer Communication Networks. --- Coding and Information Theory. --- Computer science. --- Data encryption (Computer science). --- Coding theory. --- Computer software. --- Computational complexity. --- Algebra --- Informatique --- Réseaux d'ordinateurs --- Chiffrement (Informatique) --- Codage --- Logiciels --- Complexité de calcul (Informatique) --- Algèbre --- Data processing. --- Algebraic fields --- Engineering & Applied Sciences --- Computer Science --- Algebraic number fields --- Algebraic numbers --- Fields, Algebraic --- Computer communication systems. --- Algorithms. --- Computer science --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Distributed processing --- Cryptology. --- Software, Computer --- Computer systems --- Complexity, Computational --- Algebra, Abstract --- Algebraic number theory --- Rings (Algebra) --- Computer science—Mathematics. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Discrete mathematics. --- Cryptography. --- Computer networks. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis
Choose an application
This book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI 2008, held in Siena, Italy, in July 2008. The 16 revised full papers presented were carefully reviewed and selected from 34 submissions. The papers are organized in topical sections on structures in finite fields, efficient finite field arithmetic, efficient implementation and architectures, classification and construction of mappings over finite fields, and codes and cryptography.
Finite fields (Algebra) --- Mappings (Mathematics) --- Curves, Algebraic --- Algebraic curves --- Algebraic varieties --- Maps (Mathematics) --- Functions --- Functions, Continuous --- Topology --- Transformations (Mathematics) --- Modular fields (Algebra) --- Algebra, Abstract --- Algebraic fields --- Galois theory --- Modules (Algebra) --- Coding theory. --- Data encryption (Computer science). --- Computational complexity. --- Computer software. --- Algebra --- Algorithms. --- Coding and Information Theory. --- Cryptology. --- Discrete Mathematics in Computer Science. --- Algorithm Analysis and Problem Complexity. --- Symbolic and Algebraic Manipulation. --- Data processing. --- Software, Computer --- Computer systems --- Complexity, Computational --- Electronic data processing --- Machine theory --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Algorism --- Arithmetic --- Foundations --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Cryptography. --- Discrete mathematics. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI 2008, held in Siena, Italy, in July 2008. The 16 revised full papers presented were carefully reviewed and selected from 34 submissions. The papers are organized in topical sections on structures in finite fields, efficient finite field arithmetic, efficient implementation and architectures, classification and construction of mappings over finite fields, and codes and cryptography.
Mathematical logic --- Ergodic theory. Information theory --- Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- algebra --- coderen --- DES (data encryption standard) --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- algoritmen --- informatietheorie
Choose an application
This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed to implement efficient cryptographic algorithms in FPGA reconfigurable hardware platforms. The concepts and techniques reviewed in this book will make special emphasis on the practical aspects of reconfigurable hardware design, explaining the basic mathematics related and giving a comprehensive description of state-of-the-art implementation techniques. The authors show how high-speed cryptographic algorithms implementations can be achieved on reconfigurable hardware devices without posing prohibited high requirements for hardware resources. The material in this book will be of interest to engineering professionals, programmers, hardware designers, and graduate students interested in the development of security and cryptographic mechanisms at a beginning/intermediate level.
Mass communications --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- beeldverwerking --- cryptografie --- cryptologie --- hardware --- programmatielogica --- algoritmen --- computernetwerken --- communicatietechnologie --- numerieke analyse --- signaalverwerking
Listing 1 - 10 of 13 | << page >> |
Sort by
|