0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (84)
  • R500+ (1,901)
  • -
Status
Format
Author / Contributor
Publisher

Books > Reference & Interdisciplinary > Communication studies > Coding theory & cryptology

Alan Turing: The Enigma - The Book That Inspired the Film The Imitation Game (Paperback, Media tie-in): Andrew Hodges Alan Turing: The Enigma - The Book That Inspired the Film The Imitation Game (Paperback, Media tie-in)
Andrew Hodges 1
R393 R364 Discovery Miles 3 640 Save R29 (7%) Ships in 9 - 17 working days

The official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany's air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer. Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.

Information Theory and Coding by Example (Paperback, New): Mark Kelbert, Yuri Suhov Information Theory and Coding by Example (Paperback, New)
Mark Kelbert, Yuri Suhov
R1,546 Discovery Miles 15 460 Ships in 10 - 15 working days

This fundamental monograph introduces both the probabilistic and algebraic aspects of information theory and coding. It has evolved from the authors' years of experience teaching at the undergraduate level, including several Cambridge Maths Tripos courses. The book provides relevant background material, a wide range of worked examples and clear solutions to problems from real exam papers. It is a valuable teaching aid for undergraduate and graduate students, or for researchers and engineers who want to grasp the basic principles.

New Foundations for Information Theory - Logical Entropy and Shannon Entropy (Paperback, 1st ed. 2021): David Ellerman New Foundations for Information Theory - Logical Entropy and Shannon Entropy (Paperback, 1st ed. 2021)
David Ellerman
R1,427 Discovery Miles 14 270 Ships in 9 - 17 working days

This monograph offers a new foundation for information theory that is based on the notion of information-as-distinctions, being directly measured by logical entropy, and on the re-quantification as Shannon entropy, which is the fundamental concept for the theory of coding and communications. Information is based on distinctions, differences, distinguishability, and diversity. Information sets are defined that express the distinctions made by a partition, e.g., the inverse-image of a random variable so they represent the pre-probability notion of information. Then logical entropy is a probability measure on the information sets, the probability that on two independent trials, a distinction or "dit" of the partition will be obtained. The formula for logical entropy is a new derivation of an old formula that goes back to the early twentieth century and has been re-derived many times in different contexts. As a probability measure, all the compound notions of joint, conditional, and mutual logical entropy are immediate. The Shannon entropy (which is not defined as a measure in the sense of measure theory) and its compound notions are then derived from a non-linear dit-to-bit transform that re-quantifies the distinctions of a random variable in terms of bits-so the Shannon entropy is the average number of binary distinctions or bits necessary to make all the distinctions of the random variable. And, using a linearization method, all the set concepts in this logical information theory naturally extend to vector spaces in general-and to Hilbert spaces in particular-for quantum logical information theory which provides the natural measure of the distinctions made in quantum measurement. Relatively short but dense in content, this work can be a reference to researchers and graduate students doing investigations in information theory, maximum entropy methods in physics, engineering, and statistics, and to all those with a special interest in a new approach to quantum information theory.

Culture and Computing. Design Thinking and Cultural Computing - 9th International Conference, C&C 2021, Held as Part of the... Culture and Computing. Design Thinking and Cultural Computing - 9th International Conference, C&C 2021, Held as Part of the 23rd HCI International Conference, HCII 2021, Virtual Event, July 24-29, 2021, Proceedings, Part II (Paperback, 1st ed. 2021)
Matthias Rauterberg
R2,261 Discovery Miles 22 610 Ships in 18 - 22 working days

The two-volume set LNCS 12794-12795 constitutes the refereed proceedings of the 9th International Conference on Culture and Computing, C&C 2021, which was held as part of HCI International 2021 and took place virtually during July 24-29, 2021.The total of 1276 papers and 241 posters included in the 39 HCII 2021 proceedings volumes was carefully reviewed and selected from 5222 submissions. The papers included in the HCII-C&C volume set were organized in topical sections as follows: Part I: ICT for cultural heritage; technology and art; visitors' experiences in digital culture; Part II: Design thinking in cultural contexts; digital humanities, new media and culture; perspectives on cultural computing.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R3,199 Discovery Miles 31 990 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,970 Discovery Miles 29 700 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Advances in Cryptology -  ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part IV (Paperback, 1st ed. 2022)
Shweta Agrawal, Dongdai Lin
R2,723 Discovery Miles 27 230 Ships in 18 - 22 working days

The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.

Codebreaker in the Far East (Paperback, New edition): Alan Stripp Codebreaker in the Far East (Paperback, New edition)
Alan Stripp
R805 Discovery Miles 8 050 Ships in 10 - 15 working days

Codebreaker in the Far East is the first book to describe how Bletchley Park and its Indian and Far Eastern outposts broke a series of Japanese codes and cipher systems of dazzling variety and complexity. Alan Stripp gives his first-hand account of the excitement of reading the enemy's mind, of working against the clock, hampered by one of the world's most daunting languages and the knowledge that they were facing an unyielding and resourceful enemy who had never known defeat.

Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Hardcover, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,388 R895 Discovery Miles 8 950 Save R493 (36%) Ships in 9 - 17 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

Fundamentals of Information Theory and Coding Design (Hardcover): Roberto Togneri, Christopher J. S. Desilva Fundamentals of Information Theory and Coding Design (Hardcover)
Roberto Togneri, Christopher J. S. Desilva
R3,956 Discovery Miles 39 560 Ships in 10 - 15 working days

Books on information theory and coding have proliferated over the last few years, but few succeed in covering the fundamentals without losing students in mathematical abstraction. Even fewer build the essential theoretical framework when presenting algorithms and implementation details of modern coding systems.

Without abandoning the theoretical foundations, Fundamentals of Information Theory and Coding Design presents working algorithms and implementations that can be used to design and create real systems. The emphasis is on the underlying concepts governing information theory and the mathematical basis for modern coding systems, but the authors also provide the practical details of important codes like Reed-Solomon, BCH, and Turbo codes. Also setting this text apart are discussions on the cascading of information channels and the additivity of information, the details of arithmetic coding, and the connection between coding of extensions and Markov modelling.

Complete, balanced coverage, an outstanding format, and a wealth of examples and exercises make this an outstanding text for upper-level students in computer science, mathematics, and engineering and a valuable reference for telecommunications engineers and coding theory researchers.

Relational Calculus for Actionable Knowledge (Paperback, 1st ed. 2022): Michel Bares, Eloi Bosse Relational Calculus for Actionable Knowledge (Paperback, 1st ed. 2022)
Michel Bares, Eloi Bosse
R1,761 Discovery Miles 17 610 Ships in 18 - 22 working days

This book focuses on one of the major challenges of the newly created scientific domain known as data science: turning data into actionable knowledge in order to exploit increasing data volumes and deal with their inherent complexity. Actionable knowledge has been qualitatively and intensively studied in management, business, and the social sciences but in computer science and engineering, its connection has only recently been established to data mining and its evolution, 'Knowledge Discovery and Data Mining' (KDD). Data mining seeks to extract interesting patterns from data, but, until now, the patterns discovered from data have not always been 'actionable' for decision-makers in Socio-Technical Organizations (STO). With the evolution of the Internet and connectivity, STOs have evolved into Cyber-Physical and Social Systems (CPSS) that are known to describe our world today. In such complex and dynamic environments, the conventional KDD process is insufficient, and additional processes are required to transform complex data into actionable knowledge. Readers are presented with advanced knowledge concepts and the analytics and information fusion (AIF) processes aimed at delivering actionable knowledge. The authors provide an understanding of the concept of 'relation' and its exploitation, relational calculus, as well as the formalization of specific dimensions of knowledge that achieve a semantic growth along the AIF processes. This book serves as an important technical presentation of relational calculus and its application to processing chains in order to generate actionable knowledge. It is ideal for graduate students, researchers, or industry professionals interested in decision science and knowledge engineering.

A Comprehensive Course in Number Theory (Paperback, New): Alan Baker A Comprehensive Course in Number Theory (Paperback, New)
Alan Baker
R1,206 Discovery Miles 12 060 Ships in 10 - 15 working days

Developed from the author's popular text, A Concise Introduction to the Theory of Numbers, this book provides a comprehensive initiation to all the major branches of number theory. Beginning with the rudiments of the subject, the author proceeds to more advanced topics, including elements of cryptography and primality testing, an account of number fields in the classical vein including properties of their units, ideals and ideal classes, aspects of analytic number theory including studies of the Riemann zeta-function, the prime-number theorem and primes in arithmetical progressions, a description of the Hardy-Littlewood and sieve methods from respectively additive and multiplicative number theory and an exposition of the arithmetic of elliptic curves. The book includes many worked examples, exercises and further reading. Its wider coverage and versatility make this book suitable for courses extending from the elementary to beginning graduate studies.

Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK,... Cyber-Physical Security for Critical Infrastructures Protection - First International Workshop, CPS4CIP 2020, Guildford, UK, September 18, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Habtamu Abie, Silvio Ranise, Luca Verderame, Enrico Cambiaso, Rita Ugarelli, …
R1,181 Discovery Miles 11 810 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Workshop on Cyber-Physical Security for Critical Infrastructures Protection, CPS4CIP 2020, which was organized in conjunction with the European Symposium on Research in Computer Security, ESORICS 2020, and held online on September 2020.The 14 full papers presented in this volume were carefully reviewed and selected from 24 submissions. They were organized in topical sections named: security threat intelligence; data anomaly detection: predict and prevent; computer vision and dataset for security; security management and governance; and impact propagation and power traffic analysis. The book contains 6 chapters which are available open access under a CC-BY license.

Applied Cryptography in Computer and Communications - First EAI International Conference, AC3 2021, Virtual Event, May 15-16,... Applied Cryptography in Computer and Communications - First EAI International Conference, AC3 2021, Virtual Event, May 15-16, 2021, Proceedings (Paperback, 1st ed. 2021)
Bo Chen, Xinyi Huang
R1,783 R1,680 Discovery Miles 16 800 Save R103 (6%) Ships in 9 - 17 working days

This book constitutes the refereed post-conference proceedings of the First International Conference on Applied Cryptography in Computer and Communications, AC3 2021, and the First International Workshop on Security for Internet of Things (IoT). The conference was held in May 2021 and due to COVID-19 pandemic virtually.The 15 revised full papers were carefully reviewed and selected from 42 submissions. The papers present are grouped in 4 tracks on blockchain; authentication; secure computation; practical crypto application. They detail technical aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices.

Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Takanori Isobe, Santanu Sarkar
R2,961 Discovery Miles 29 610 Ships in 18 - 22 working days

The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11-14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography

Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Paperback, 1st ed. 2022): Anubhab Baksi Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Paperback, 1st ed. 2022)
Anubhab Baksi
R4,013 Discovery Miles 40 130 Ships in 18 - 22 working days

This book consolidates several key aspects from the state-of-the-art research in symmetric key cryptography, which is among the cornerstones of digital security. It presents the content in an informative yet beginner-friendly, accompanied with toy examples and comprehensible graphics. In particular, it highlights the recent developments in tool-assisted analysis of ciphers. Furthermore, promising device-dependent attacks, such as fault attack and side channel attacks on symmetric key ciphers, are discussed in detail. One salient feature of this book is to present a detailed analysis of various fault countermeasures. The coverage of our book is quite diverse-it ranges from prerequisite information, latest research contribution as well as future research directions. It caters to students and researchers working in the field of cryptography.

Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I... Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Eike Kiltz, Vinod Vaikuntanathan
R3,005 Discovery Miles 30 050 Ships in 18 - 22 working days

The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.

Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II... Theory of Cryptography - 20th International Conference, TCC 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Eike Kiltz, Vinod Vaikuntanathan
R4,834 Discovery Miles 48 340 Ships in 18 - 22 working days

The three-volume set LNCS 13747, LNCS 13748 and LNCS 13749 constitutes the refereed proceedings of the 20th International Conference on Theory of Cryptography, TCC 2022, held in Chicago, IL, USA, in November 2022. The total of 60 full papers presented in this three-volume set was carefully reviewed and selected from 139 submissions. They cover topics on post-quantum cryptography; interactive proofs; quantum cryptography; secret-sharing and applications; succinct proofs; identity-based encryption and functional encryption; attribute-based encryption and functional encryption; encryption; multi-party computation; protocols: key agreement and commitments; theory: sampling and friends; lattices; anonymity, verfiability and robustness; ORAM, OT and PIR; and theory.

Machine Translation - 18th China Conference, CCMT 2022, Lhasa, China, August 6-10, 2022, Revised Selected Papers (Paperback,... Machine Translation - 18th China Conference, CCMT 2022, Lhasa, China, August 6-10, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Tong Xiao, Juan Pino
R1,716 Discovery Miles 17 160 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th China Conference on Machine Translation, CCMT 2022, held in Lhasa, China, during August 6-10, 2022. The 16 full papers were included in this book were carefully reviewed and selected from 73 submissions.

Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings... Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings (Paperback, 1st ed. 2022)
Emmanuel Ahene, Fagen Li
R2,467 Discovery Miles 24 670 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th International Conference on Frontiers in Cyber Security, FCS 2022, held in Kumasi, Ghana, during December 13-15, 2022. The 26 full papers were included in this book were carefully reviewed and selected from 65 submissions. They were organized in topical sections as follows: ioT Security; artificial intelligence and cyber security; blockchain technology and application; cryptography; database security; quantum cryptography; and network security.

Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022,... Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo
R2,496 Discovery Miles 24 960 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Paperback, 1st ed. 2022):... Blockchain, Artificial Intelligence, and the Internet of Things - Possibilities and Opportunities (Paperback, 1st ed. 2022)
Pethuru Raj, Ashutosh Kumar Dubey, Abhishek Kumar, Pramod Singh Rathore
R1,502 Discovery Miles 15 020 Ships in 18 - 22 working days

This book provides basic concepts and deep knowledge about various security mechanisms that can be implemented in IoT through Blockchain technology. This book aids readers in gaining insight and knowledge about providing security and solutions to different challenges in IoT using Blockchain technology. This book primarily focuses on challenges to addressing the integration of the IoT with Blockchain with respect to potential benefits for IoT. This book gives descriptive analysis of Blockchain integrated with IoT applications and platforms for the development of IoT solutions along with possible topologies to that integration. Several application examples are included in a variety of industries.

Cryptology and Network Security - 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16,... Cryptology and Network Security - 21st International Conference, CANS 2022, Abu Dhabi, United Arab Emirates, November 13-16, 2022, Proceedings (Paperback, 1st ed. 2022)
Alastair R. Beresford, Arpita Patra, Emanuele Bellini
R2,117 Discovery Miles 21 170 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates.The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.

Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected... Financial Cryptography and Data Security - 26th International Conference, FC 2022, Grenada, May 2-6, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Ittay Eyal, Juan Garay
R2,999 Discovery Miles 29 990 Ships in 18 - 22 working days

This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022. The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.

Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA,... Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Yevgeniy Dodis, Thomas Shrimpton
R1,552 Discovery Miles 15 520 Ships in 18 - 22 working days

The 4-volume sets LNCS 13507, 13508, 13509, 13510 constitutes the refereed proceedings of the 42nd Annual International Cryptology Conference, CRYPTO 2022, which was held in Santa Barbara, CA, USA, in August 2022. The total of 100 papers included in the proceedings was reviewed and selected from 455 submissions. The papers were organized in the following topical sections: Cryptanalysis; randomness; quantum cryptography; advanced encryption systems; secure messaging; lattice-based zero knowledge; lattice-based signatures; blockchain; coding theory; public key cryptography; signatures, idealized models; lower bounds; secure hash functions; post-quantum cryptography; symmetric cryptanalysis; secret sharing and secure multiparty computation; unique topics; symmetric key theory; zero knowledge; and threshold signatures.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Chaotic Transport in Dynamical Systems
Stephen Wiggins Hardcover R2,821 Discovery Miles 28 210
Topics On Chaotic Systems: Selected…
Christos H. Skiadas, Ioannis Dimotikalis, … Hardcover R3,770 Discovery Miles 37 700
Chaos, Criminology, and Social Justice…
Dragan Milovanovic Hardcover R2,537 Discovery Miles 25 370
Controlling Chaos - Suppression…
Huaguang Zhang, Derong Liu, … Hardcover R4,204 Discovery Miles 42 040
Quasi-Periodic Motions in Families of…
Hendrik W. Broer, George B. Huitema, … Paperback R1,789 Discovery Miles 17 890
Chaos: From Simple Models To Complex…
Angelo Vulpiani, Fabio Cecconi, … Hardcover R4,181 Discovery Miles 41 810
Chaos In Chemistry And Biochemistry
Richard J. Field, Laszlo Gyorgyi Hardcover R3,098 Discovery Miles 30 980
Introduction to Discrete Dynamical…
M. Martelli Hardcover R4,675 Discovery Miles 46 750
Introduction to Modern Dynamics - Chaos…
David D. Nolte Paperback R1,493 Discovery Miles 14 930
Chaotic Dynamics In Hamiltonian Systems…
Harry Dankowicz Hardcover R2,449 Discovery Miles 24 490

 

Partners