0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (9)
  • R2,500 - R5,000 (6)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Algebraic Curves in Cryptography (Paperback): San Ling, Huaxiong Wang, Chaoping Xing Algebraic Curves in Cryptography (Paperback)
San Ling, Huaxiong Wang, Chaoping Xing
R1,875 Discovery Miles 18 750 Ships in 12 - 17 working days

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.

Coding, Cryptography and Combinatorics (Paperback, Softcover reprint of the original 1st ed. 2004): Keqin Feng, Harald... Coding, Cryptography and Combinatorics (Paperback, Softcover reprint of the original 1st ed. 2004)
Keqin Feng, Harald Niederreiter, Chaoping Xing
R2,997 Discovery Miles 29 970 Ships in 10 - 15 working days

It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication."

Cryptography and Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2001): Kwok Y. Lam, Igor... Cryptography and Computational Number Theory (Paperback, Softcover reprint of the original 1st ed. 2001)
Kwok Y. Lam, Igor Shparlinski, Huaxiong Wang, Chaoping Xing
R1,588 Discovery Miles 15 880 Ships in 10 - 15 working days

This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the ory. The event followed the concept of the research programs at such well-known research institutions as the Newton Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy (France). Accordingly, there were only invited lectures at the workshop with plenty of time for informal discussions. It was hoped and successfully achieved that the meeting would encourage and stimulate further research in information and computer security as well as in the design and implementation of number theoretic cryptosystems and other related areas. Another goal of the meeting was to stimulate collaboration and more active interaction between mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government."

Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback,... Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback, Edition.)
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, …
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Coding and Cryptology - Second International Workshop, IWCC 2009 (Paperback, 2009 ed.): Yeow Meng Chee, Chao Li, San Ling,... Coding and Cryptology - Second International Workshop, IWCC 2009 (Paperback, 2009 ed.)
Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
R1,557 Discovery Miles 15 570 Ships in 10 - 15 working days

The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian Province, China, during June 11-15, 2007 and attracted over 80 participants. Following this s- cess, the second IWCC was held June 1-5, 2009 at Zhangjiajie, Hunan Province, China. Zhangjiajie is one of the most scenic areas in China. The proceedings of this workshop consist of 21 technical papers, covering a wide range of topics in coding and cryptology, as well as related ?elds such as combinatorics. All papers, except one, are contributed by the invited speakers of the workshop and each paper has been carefully reviewed. We are grateful to the external reviewers for their help, which has greatly strengthened the quality of the proceedings. IWCC 2009 was co-organizedby the National University of Defense Techn- ogy (NUDT), China and Nanyang Technological University (NTU), Singapore. We acknowledge with gratitude the ?nancial support from NUDT. We wouldliketo expressourthanks to Springer formaking it possible forthe proceedings to be published in the Lecture Notes in Computer Science series.

Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings... Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Paperback, 2007 ed.)
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.

The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Coding, Cryptography and Combinatorics (Hardcover, 2004 ed.): Keqin Feng, Harald Niederreiter, Chaoping Xing Coding, Cryptography and Combinatorics (Hardcover, 2004 ed.)
Keqin Feng, Harald Niederreiter, Chaoping Xing
R3,217 Discovery Miles 32 170 Ships in 10 - 15 working days

It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the conference had to be cancelled in the interest of the health of the participants. The SARS epidemic posed too serious a threat. At the time of the cancellation, the organization of the conference was at an advanced stage: all invited speakers had been selected and all abstracts of contributed talks had been screened by the program committee. Thus, it was de cided to call on all invited speakers and presenters of accepted contributed talks to submit their manuscripts for publication in the present volume. Altogether, 39 submissions were received and subjected to another round of refereeing. After care ful scrutiny, 28 papers were accepted for publication."

Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'99 - International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 Proceedings (Paperback, 1999 ed.)
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing
R1,743 Discovery Miles 17 430 Ships in 10 - 15 working days

Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering Comm- tee and the Centre for Systems Security of the National University of Singapore, and in cooperation with the International Association for Cryptology Research. As the Program Co-Chairs of Asiacrypt'99, we are extremely honored to or- nize this event, which showcases the state-of-the-art development of cryptology research at the conclusion of this millennium. This year, a total of 96 research papers were submitted to Asiacrypt'99. The portfolio of country of origin of submissions serves as a good indicator of the - ternational reputation of the conference. Countries from which submissions or- inated include: Australia, Belgium, China, Estonia, France, Germany, Greece, India, Iran, Japan, Korea, Norway, Russia, Saudi Arabia, Switzerland, Sin- pore, Spain, Taiwan, Thailand, The Netherlands, Turkey, Ukraine, UK, USA and Yugoslavia. Through a stringent refereeing process by the Program C- mittee, 31 papers of outstanding quality were accepted and are included in the conference proceedings. Accepted papers were authored by researchers from the following countries: Australia, Belgium, France, Germany, India, Japan, China, Singapore, Switzerland, Taiwan, The Netherlands, UK, and USA.

Algebraic Geometry in Coding Theory and Cryptography (Hardcover): Harald Niederreiter, Chaoping Xing Algebraic Geometry in Coding Theory and Cryptography (Hardcover)
Harald Niederreiter, Chaoping Xing
R1,685 R1,507 Discovery Miles 15 070 Save R178 (11%) Ships in 12 - 17 working days

This textbook equips graduate students and advanced undergraduates with the necessary theoretical tools for applying algebraic geometry to information theory, and it covers primary applications in coding theory and cryptography. Harald Niederreiter and Chaoping Xing provide the first detailed discussion of the interplay between nonsingular projective curves and algebraic function fields over finite fields. This interplay is fundamental to research in the field today, yet until now no other textbook has featured complete proofs of it. Niederreiter and Xing cover classical applications like algebraic-geometry codes and elliptic-curve cryptosystems as well as material not treated by other books, including function-field codes, digital nets, code-based public-key cryptosystems, and frameproof codes. Combining a systematic development of theory with a broad selection of real-world applications, this is the most comprehensive yet accessible introduction to the field available. * Introduces graduate students and advanced undergraduates to the foundations of algebraic geometry for applications to information theory * Provides the first detailed discussion of the interplay between projective curves and algebraic function fields over finite fields * Includes applications to coding theory and cryptography * Covers the latest advances in algebraic-geometry codes * Features applications to cryptography not treated in other books

Cryptography and Computational Number Theory - Workshop in Singapore, 1999 (Hardcover): Igor E Shparlinski, Etc, Kwook-Yan Lam,... Cryptography and Computational Number Theory - Workshop in Singapore, 1999 (Hardcover)
Igor E Shparlinski, Etc, Kwook-Yan Lam, Wang, Huaxiong University of Wollongong, Australia), Chaoping Xing
R2,747 Discovery Miles 27 470 Ships in 10 - 15 working days

The fields of cryptography and computational number theory have recently witnessed a rapid development, which was the subject of the CCNT workshop in Singapore in November 1999. Its aim was to stimulate further research in information and computer security as well as the design and implementation of number theoretic cryptosystems and other related areas. Another achievement of the meeting was the collaboration of mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government. The present volume comprises a selection of refereed papers originating from this event, presenting either a survey of some area or original and new results. They concern many different aspects of the field such as theory, techniques, applications and practical experience. It provides a state-of-the-art report on some number theoretical issues of significance to cryptography.

Applied Algebra and Number Theory (Hardcover): Gerhard Larcher, Friedrich Pillichshammer, Arne Winterhof, Chaoping Xing Applied Algebra and Number Theory (Hardcover)
Gerhard Larcher, Friedrich Pillichshammer, Arne Winterhof, Chaoping Xing
R3,573 Discovery Miles 35 730 Ships in 10 - 15 working days

Harald Niederreiter's pioneering research in the field of applied algebra and number theory has led to important and substantial breakthroughs in many areas. This collection of survey articles has been authored by close colleagues and leading experts to mark the occasion of his 70th birthday. The book provides a modern overview of different research areas, covering uniform distribution and quasi-Monte Carlo methods as well as finite fields and their applications, in particular, cryptography and pseudorandom number generation. Many results are published here for the first time. The book serves as a useful starting point for graduate students new to these areas or as a refresher for researchers wanting to follow recent trends.

Coding Theory - A First Course (Hardcover): San Ling, Chaoping Xing Coding Theory - A First Course (Hardcover)
San Ling, Chaoping Xing
R4,633 Discovery Miles 46 330 Ships in 10 - 15 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Coding Theory - A First Course (Paperback): San Ling, Chaoping Xing Coding Theory - A First Course (Paperback)
San Ling, Chaoping Xing
R2,315 Discovery Miles 23 150 Ships in 10 - 15 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Rational Points on Curves over Finite Fields - Theory and Applications (Paperback): Harald Niederreiter, Chaoping Xing Rational Points on Curves over Finite Fields - Theory and Applications (Paperback)
Harald Niederreiter, Chaoping Xing
R2,497 Discovery Miles 24 970 Ships in 10 - 15 working days

Rational points on algebraic curves over finite fields is a key topic for algebraic geometers and coding theorists. Here, the authors relate an important application of such curves, namely, to the construction of low-discrepancy sequences, needed for numerical methods in diverse areas. They sum up the theoretical work on algebraic curves over finite fields with many rational points and discuss the applications of such curves to algebraic coding theory and the construction of low-discrepancy sequences.

Algebraic Curves in Cryptography (Hardcover, New): San Ling, Huaxiong Wang, Chaoping Xing Algebraic Curves in Cryptography (Hardcover, New)
San Ling, Huaxiong Wang, Chaoping Xing
R3,253 Discovery Miles 32 530 Ships in 12 - 17 working days

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption.

Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Blinde Mol Of Wyse Uil? - Hoe Om Met…
Susan Coetzer Paperback R270 R232 Discovery Miles 2 320
Brightside
The Lumineers CD R194 Discovery Miles 1 940
Sony PlayStation 5 DualSense Wireless…
R1,599 R1,479 Discovery Miles 14 790
Hani - A Life Too Short
Janet Smith, Beauregard Tromp Paperback R310 R248 Discovery Miles 2 480
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Tower Sign - Beware Of The Dog…
R60 R46 Discovery Miles 460
Intopic LS-001 Adjustable Laptop Bracket
R299 R129 Discovery Miles 1 290
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Chicco Natural Feeling Manual Breast…
R799 Discovery Miles 7 990
Lucky Metal Cut Throat Razer Carrier
R30 Discovery Miles 300

 

Partners