Home | Amazing | Today | Tags | Publishers | Years | Search 
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002

SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a...

Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

A Classical Introduction to Cryptography Exercise Book
A Classical Introduction to Cryptography Exercise Book
This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical...
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
General Theory of Information Transfer and Combinatorics (Lecture Notes in Computer Science)
This book constitutes the thoroughly refereed research papers contributed to a research project on the `General Theory of Information Transfer and Combinatorics' that was hosted from 2001-2004 at the Center for Interdisciplinary Research (ZIF) of Bielefeld University and also papers of several incorporated meetings thereof.

The 63 revised full...

Computational Complexity: A Conceptual Perspective
Computational Complexity: A Conceptual Perspective
This book offers a comprehensive perspective to modern topics in complexity theory, which is a central field of the theoretical foundations of computer science. It addresses the looming question of what can be achieved within a limited amount of time with or without other limited natural computational resources. Can be used as an introduction for...
Elementary Number Theory with Applications, Second Edition
Elementary Number Theory with Applications, Second Edition
or over two thousand years, number theory has fascinated and inspired both Famateurs and mathematicians alike. A sound and fundamental body of knowledge, it has been developed by the untiring pursuits of mathematicians all over the world. Today, number theorists continue to develop some of the most sophisticated mathematical tools ever devised and...
Critical Reflections on Information Systems: A Systemic Approach
Critical Reflections on Information Systems: A Systemic Approach
While implementing IS and IT in support of their business strategies, companies are looking for ways to bridge the gap between their competitive position and technological investment, including ways to use this investment to the advantage of the organization. Critical Reflections on Information Systems: A Systemic Approach faces this challenge by...
Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
The LLL Algorithm: Survey and Applications (Information Security and Cryptography)
The LLL Algorithm: Survey and Applications (Information Security and Cryptography)

The LLL algorithm is a polynomial-time lattice reduction algorithm, named after its inventors, Arjen Lenstra, Hendrik Lenstra and László Lovász. The algorithm has revolutionized computational aspects of the geometry of numbers since its introduction in 1982, leading to breakthroughs in fields as diverse as computer algebra,...

Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology)
Advances in Coding Theory and Crytography (Series on Coding Theory and Cryptology)

Due to the increasing importance of digital communications, the area of research in coding theory and cryptography is broad and fast developing. In this book there are presented some of the latest research developments in the area. The book grew as a combination of two research conferences organized in the area: the Vlora Conference in Coding...

Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201
Topics in Cryptology -- CT-RSA 2011: The Cryptographers' Track at the RSA Conference 201

The RSA conference was initiated in 1991 and is a major international event for cryptography and information security researchers as well as the industry related to these disciplines. It is an annual event that attracts hundreds of vendors and thousands of participants from industry and academia. Since 2001, the RSA conference has included...

Probability: With Applications and R
Probability: With Applications and R

An introduction to probability at the undergraduate level

Chance and randomness are encountered on a daily basis. Authored by a highly qualified professor in the field, Probability: With Applications and R delves into the theories and applications essential to obtaining a thorough understanding of probability.

...
Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy