0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Authentication Codes and Combinatorial Designs (Paperback): Dingyi Pei Authentication Codes and Combinatorial Designs (Paperback)
Dingyi Pei
R1,952 Discovery Miles 19 520 Ships in 12 - 17 working days

Researchers and practitioners of cryptography and information security are constantly challenged to respond to new attacks and threats to information systems. Authentication Codes and Combinatorial Designs presents new findings and original work on perfect authentication codes characterized in terms of combinatorial designs, namely strong partially balanced designs (SPBD). Beginning with examples illustrating the concepts of authentication schemes and combinatorial designs, the book considers the probability of successful deceptions followed by schemes involving three and four participants, respectively. From this point, the author constructs the perfect authentication schemes and explores encoding rules for such schemes in some special cases. Using rational normal curves in projective spaces over finite fields, the author constructs a new family of SPBD. He then presents some established combinatorial designs that can be used to construct perfect schemes, such as t-designs, orthogonal arrays of index unity, and designs constructed by finite geometry. The book concludes by studying definitions of perfect secrecy, properties of perfectly secure schemes, and constructions of perfect secrecy schemes with and without authentication. Supplying an appendix of construction schemes for authentication and secrecy schemes, Authentication Codes and Combinatorial Designs points to new applications of combinatorial designs in cryptography.

Advances in Cryptology - ASIACRYPT'98 - International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT'98 - International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings (Paperback, 1998 ed.)
Kazuo Ohta, Dingyi Pei
R1,606 Discovery Miles 16 060 Ships in 10 - 15 working days

ASIACRYPT'98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT'98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors' affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers.

Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007,... Information Security and Cryptology - Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers (Paperback, 2008 ed.)
Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu
R1,637 Discovery Miles 16 370 Ships in 10 - 15 working days

The Third SKLOIS Conference on Information Security and Cryptology (- scrypt2007)wasorganizedbytheStateKeyLaboratoryofInformationSecurity of the Chinese Academy of Sciences in cooperation with Qinhai University for Nationalities. This international conference was held in Xining, Qinhai Province of China, and was sponsored by the Institute of Software, the Chinese Academy of Sciences, the Graduate University of the Chinese Academy of Sciences and the National Natural Science Foundations of China. By now, Inscrypt (the International SKLOIS Conference on Information - curity and Cryptology) has become a tradition, and it is, in fact, a leading event in this area, which takes place annually in China. We are pleased with the continuous support by authors, committee members, reviewers, sponsors and organizers. Indeed, the research areas covered by Inscrypt are important, since modern computing (including communication infrastructures and applications) requires increased security, trust, safety and reliability. This need has motivated the research community worldwide to produce important fundamental, exp- imental and applied work in the wide areas of cryptography and information securityresearchin recent years.Accordingly, the programof Inscrypt 2007c- ered numerous ?elds of research within these general areas

Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography (Hardcover): Dingyi Pei, Arto Salomaa, Cunsheng Ding Chinese Remainder Theorem: Applications In Computing, Coding, Cryptography (Hardcover)
Dingyi Pei, Arto Salomaa, Cunsheng Ding
R2,722 Discovery Miles 27 220 Ships in 10 - 15 working days

Chinese Remainder Theorem, CRT, is one of the jewels of mathematics. It is a perfect combination of beauty and utility or, in the words of Horace, omne tulit punctum qui miscuit utile dulci. Known already for ages, CRT continues to present itself in new contexts and open vistas for new types of applications. So far, its usefulness has been obvious within the realm of "three C's". Computing was its original field of application, and continues to be important as regards various aspects of algorithmics and modular computations. Theory of codes and cryptography are two more recent fields of application.This book tells about CRT, its background and philosophy, history, generalizations and, most importantly, its applications. The book is self-contained. This means that no factual knowledge is assumed on the part of the reader. We even provide brief tutorials on relevant subjects, algebra and information theory. However, some mathematical maturity is surely a prerequisite, as our presentation is at an advanced undergraduate or beginning graduate level. We have tried to make the exposition innovative, many of the individual results being new. We will return to this matter, as well as to the interdependence of the various parts of the book, at the end of the Introduction.A special course about CRT can be based on the book. The individual chapters are largely independent and, consequently, the book can be used as supplementary material for courses in algorithmics, coding theory, cryptography or theory of computing. Of course, the book is also a reference for matters dealing with CRT.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
MyNotes A5 Geometric Caustics Notebook
Paperback R50 R42 Discovery Miles 420
Cacharel Anais Anais L'original Eau De…
 (1)
R2,317 R992 Discovery Miles 9 920
Crucial DDR4 3200Mhz 32GB Notebook…
R1,977 R1,420 Discovery Miles 14 200
Bostik Glu Dots - Extra Strength (64…
R55 Discovery Miles 550
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Hampstead
Diane Keaton, Brendan Gleeson, … DVD R49 Discovery Miles 490
Soccer Waterbottle [Black]
R70 Discovery Miles 700
Burberry London Eau De Parfum Spray…
R2,516 R1,514 Discovery Miles 15 140
American Gods - Season 2
Ricky Whittle, Ian McShane DVD  (1)
R55 Discovery Miles 550

 

Partners