0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Post-Quantum Cryptography (Hardcover, 2009 ed.): Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen Post-Quantum Cryptography (Hardcover, 2009 ed.)
Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
R4,091 Discovery Miles 40 910 Ships in 12 - 17 working days

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.

Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14,... Progress in Cryptology - INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings (Paperback, 2011 ed.)
Daniel J. Bernstein, Sanjit Chatterjee
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Post-Quantum Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009): Daniel J. Bernstein, Johannes Buchmann,... Post-Quantum Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
R4,296 Discovery Miles 42 960 Ships in 10 - 15 working days

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.

Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa,... Progress in Cryptology - AFRICACRYPT 2010 - Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings (Paperback, Edition.)
Daniel J. Bernstein, Tanja Lange
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days

Africacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3-6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting paperswererequiredto registertitles andabstractsby the ?rstdeadline, January 5. A total of 121 submissions had been received by this deadline, - though some were withdrawn before review. Authors were allowed to continue working on their papers until the second deadline, January 10. Submissions were evaluated in three phases over a period of nearly two months. The selection phase started on January 5: Program Committee m- bers began evaluating abstracts and volunteering to handle various papers. We assigned a team of people to each paper. The review phase started on January 11: Program Committee members were given access to the full papers and - gan in-depth reviews of 82 submissions. Most of the reviews were completed by February7, thebeginningofthediscussionphase.ProgramCommitteemembers were given access to other reviews and built consensus in their evaluations of the submissions. In the end the discussions included 285 full reports and 203 - ditional comments. The submissions, reviews, and subsequent discussions were handled smoothly by iChair

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tietie & Nanna se Huiskos
Najma Abrahams, Azba Fanie Paperback R375 R275 Discovery Miles 2 750
Lovers
Tony Rushforth Paperback R325 Discovery Miles 3 250
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba Paperback  (1)
R290 R195 Discovery Miles 1 950
On the Verge or the Geography of…
Eric Overmyer Paperback R356 Discovery Miles 3 560
Living for Pleasure
Arthur MacRae Paperback R356 Discovery Miles 3 560
Atmosfire
Jan Braai Hardcover R590 R425 Discovery Miles 4 250
Communism and Anti-Communism in Early…
Andrea Mariuzzo Hardcover R2,314 Discovery Miles 23 140
The Sleeping Sword
Tatty Hennessy Paperback R347 Discovery Miles 3 470
Glengarry Glen Ross
David Mamet Hardcover R1,234 Discovery Miles 12 340
The BENCH
K.R. McAllister Paperback R273 Discovery Miles 2 730

 

Partners