0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (13)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 17 of 17 matches in All Departments

Binary Quadratic Forms - An Algorithmic Approach (Hardcover, 2007 ed.): Johannes Buchmann, Ulrich Vollmer Binary Quadratic Forms - An Algorithmic Approach (Hardcover, 2007 ed.)
Johannes Buchmann, Ulrich Vollmer
R1,512 Discovery Miles 15 120 Ships in 10 - 15 working days

The book deals with algorithmic problems related to binary quadratic forms. It uniquely focuses on the algorithmic aspects of the theory. The book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography and requires only basic mathematical knowledge. The author is a world leader in number theory.

Post-Quantum Cryptography (Hardcover, 2009 ed.): Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen Post-Quantum Cryptography (Hardcover, 2009 ed.)
Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
R4,091 Discovery Miles 40 910 Ships in 12 - 17 working days

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.

Introduction to Cryptography (Paperback, 2nd ed. 2004): Johannes Buchmann Introduction to Cryptography (Paperback, 2nd ed. 2004)
Johannes Buchmann
R1,705 Discovery Miles 17 050 Ships in 12 - 17 working days

Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only know how its techniques work, but they must also be able to estimate their efficiency and security. Based on courses taught by the author, this book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter. This revised and extended edition includes new material on the AES encryption algorithm, the SHA-1 Hash algorithm, on secret sharing, as well as updates in the chapters on factoring and discrete logarithms.

Johannes A. Buchmann is Professor of Computer Science and Mathematics at the Technical University of Darmstadt, and an Associate Editor of the Journal of Cryptology. In 1985, he received a Feodor Lynen Fellowship of the Alexander von Humboldt Foundation. He has also received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation (Deutsche Forschungsgemeinschaft).

Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11,... Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings (Paperback, 1st ed. 2019)
Johannes Buchmann, Abderrahmane Nitaj, Tajjeeddine Rachidi
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Privately and Publicly Verifiable Computing Techniques - A Survey (Paperback, 1st ed. 2017): Denise Demirel, Lucas Schabhuser,... Privately and Publicly Verifiable Computing Techniques - A Survey (Paperback, 1st ed. 2017)
Denise Demirel, Lucas Schabhuser, Johannes Buchmann
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a server. It provides a brief description of all the approaches and highlights the properties each solution achieves. Further, it analyzes the level of security provided, how efficient the verification process is, who can act as a verifier and check the correctness of the result, which function class the verifiable computing scheme supports, and whether privacy with respect to t he input and/or output data is provided. On the basis of this analysis the authors then compare the different approaches and outline possible directions for future work. The book is of interest to anyone wanting to understand the state of the art of this research field.

Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016): Giulia Traverso, Denise Demirel, Johannes Buchmann Homomorphic Signature Schemes - A Survey (Paperback, 1st ed. 2016)
Giulia Traverso, Denise Demirel, Johannes Buchmann
R1,635 Discovery Miles 16 350 Ships in 10 - 15 working days

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.

Public Key Cryptography -- PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography,... Public Key Cryptography -- PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings (Paperback, 2012)
Marc Fischlin, Johannes Buchmann, Mark Manulis
R1,599 Discovery Miles 15 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May 2012. The 41 papers presented were carefully reviewed and selected from 188 submissions. The book also contains one invited talk. The papers are organized in the following topical sections: homomorphic encryption and LWE, signature schemes, code-based and multivariate crypto, public key encryption: special properties, identity-based encryption, public-key encryption: constructions, secure two-party and multi-party computations, key exchange and secure sessions, public-key encryption: relationships, DL, DDH, and more number theory, and beyond ordinary signature schemes.

Introduction to Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Johannes Buchmann Introduction to Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Johannes Buchmann
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security of cryptographic techniques. It is not sufficient for them to know only how the techniques work. This book is written for readers who want to learn about mod- ern cryptographic algorithms and their mathematical foundation but who do not have the necessary mathematical background. It is my goal to explain the basic techniques of modern cryptography, including the necessary mathematical results from linear algebra, algebra, number theory, and probability theory. I assume only basic mathematical knowledge. The book is based on courses in cryptography that I have been teaching at the Technical University, Darmstadt, since 1996. I thank all students who attended the courses and who read the manuscript carefully for their interest and support. In particular, I would like to thank Harald Baier, Gabi Barking, Manuel Breuning, Sa- fuat Hamdy, Birgit Henhapl, Michael Jacobson (who also corrected my English), Andreas Kottig, Markus Maurer, Andreas Meyer, Stefan v vi Preface Neis, Sachar Paulus, Thomas Pfahler, Marita Skrobic, Edlyn Thske, Patrick Theobald, and Ralf-Philipp Weinmann. I also thank the staff at Springer-Verlag, in particular Martin Peters, Agnes Herrmann, Claudia Kehl, Ina Lindemann, and Thrry Kornak, for their support in the preparation of this book.

Post-Quantum Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009): Daniel J. Bernstein, Johannes Buchmann,... Post-Quantum Cryptography (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen
R4,296 Discovery Miles 42 960 Ships in 10 - 15 working days

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.

Binary Quadratic Forms - An Algorithmic Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007): Johannes Buchmann,... Binary Quadratic Forms - An Algorithmic Approach (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Johannes Buchmann, Ulrich Vollmer
R1,481 Discovery Miles 14 810 Ships in 10 - 15 working days

The book deals with algorithmic problems related to binary quadratic forms. It uniquely focuses on the algorithmic aspects of the theory. The book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography and requires only basic mathematical knowledge. The author is a world leader in number theory.

Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings... Post-Quantum Cryptography - Second International Workshop, PQCrypto 2008 Cincinnati, OH, USA October 17-19, 2008 Proceedings (Paperback, 2008 ed.)
Johannes Buchmann, Jintai Ding
R1,709 Discovery Miles 17 090 Ships in 10 - 15 working days

Threedecadesagopublic-keycryptosystemsmadea revolutionarybreakthrough in cryptography. They have developed into an indispensable part of our m- ern communication system. In practical applications RSA, DSA, ECDSA, and similar public key cryptosystems are commonly used. Their security depends on assumptions about the di?culty of certain problems in number theory, such as the Integer Prime Factorization Problem or the Discrete Logarithm Problem. However, in 1994 Peter Shor showed that quantum computers could break any public-key cryptosystembased on these hard number theory problems. This means that if a reasonably powerful quantum computer could be built, it would put essentially all modern communication into peril. In 2001, Isaac Chuang and NeilGershenfeldimplemented Shor'salgorithmona7-qubitquantumcomputer. In 2007 a 16-qubit quantum computer was demonstrated by a start-up company with the prediction that a 512-qubit or even a 1024-qubit quantum computer would become available in 2008. Some physicists predicted that within the next 10 to 20 years quantum computers will be built that are su?ciently powerful to implement Shor's ideas and to break all existing public key schemes. Thus we need to look ahead to a future of quantum computers, and we need to prepare the cryptographic world for that future.

Coding Theory, Cryptography and Related Areas - Proceedings of an International Conference on Coding Theory, Cryptography and... Coding Theory, Cryptography and Related Areas - Proceedings of an International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998 (Paperback, 2000 ed.)
Johannes Buchmann, Tom Hoeholdt, Henning Stichtenoth, Horacio Tapia-Recillas
R2,868 Discovery Miles 28 680 Ships in 10 - 15 working days

Leading researchers in the field of coding theory and cryptography present their newest findings, published here for the first time following a presentation at the International Conference on Coding Theory, Cryptography and Related Areas. The authors include Tom Hoeholdt, Henning Stichtenoth, and Horacio Tapia-Recillas.

Algebra, Codes and Cryptology - First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal,... Algebra, Codes and Cryptology - First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5-7, 2019, Proceedings (Paperback, 1st ed. 2019)
Cheikh Thiecoumba Gueye, Edoardo Persichetti, Pierre-Louis Cayrel, Johannes Buchmann
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019. The 14 full papers were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on non-associative and non-commutative algebra; code, cryptology and information security.

Einfuhrung in die Kryptographie (German, Paperback, 6., uberarb. Aufl. 2016): Johannes Buchmann Einfuhrung in die Kryptographie (German, Paperback, 6., uberarb. Aufl. 2016)
Johannes Buchmann
R1,140 Discovery Miles 11 400 Ships in 10 - 15 working days

Dieses Kryptographiebuch ist geschrieben fur Studierende der Mathematik, Informatik, Physik, Elektrotechnik oder andere Leser mit mathematischer Grundbildung und wurde in vielen Vorlesungen erfolgreich eingesetzt. Es behandelt die aktuellen Techniken der modernen Kryptographie, zum Beispiel Verschlusselung und digitale Signaturen. Das Buch vermittelt auf elementare Weise alle mathematischen Grundlagen, die zu einem prazisen Verstandnis der Kryptographie noetig sind, mit vielen Beispielen und UEbungen. Die Leserinnen und Leser erhalten ein fundiertes Verstandnis der modernen Kryptographie und werden in die Lage versetzt Forschungsliteratur zur Kryptographie zu verstehen.

Informatik - Festschrift Zum 60. Geburtstag Von Gunter Hotz (German, Paperback, 1992 ed.): Johannes Buchmann Informatik - Festschrift Zum 60. Geburtstag Von Gunter Hotz (German, Paperback, 1992 ed.)
Johannes Buchmann; Harald Ganzinger, Wolfgang J. Paul
R1,421 Discovery Miles 14 210 Ships in 10 - 15 working days

Dieser Band erscheint aus Anlafi des sechzigsten Geburtstags von Gunter Hotz. Er enthiilt Arbeiten seiner Schuler, Freunde und Kollegen. Gunter Hotz ist seit 1969 Professor fur Numerische Mathematik und Informatik an der Universitiit des Saarlandes. Er hat am Aufbau des Fachbereichs Informatik der Universitiit des Saarlandes groBen Anteil, und er hat die Entwicklung der Infor matik in Deutschland wesentlich mitgepriigt. Dies wird durch die Vielfalt der hier erscheinenden Arbeiten eindrucksvoll belegt. Mit den Beitriigen im vorliegenden Buch mochten die Autoren bei Herrn Hotz einen Teil des Dankes, zu dem sie aus unterschiedlichen Grunden verpflichtet sind, abstatten. Saarbrucken, im November 1991 J. Buchmann, H. Ganzinger, W. J. Paul Inhaltsverzeichnis Abolhassan, Drefenstedt, Keller, Paul, Scheerer: On the Physical Design of PRAMs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Bernd Becker: Synthesis for Testability: Binary Decision Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Eberhard Bertsch: Ahnlichkeit von Grammatiken - Ansatze und Erfahrungen . . . . . . . . . . . . . . . . . . . . 41 Hans-Peter Blatt: Verteilung der Nullstellen von Polynomen auf JordanbOgen . . . . . . . . . . . . . . . . . . . . 55 Johannes Buchmann, Stephan Diillmann: Distributed Class Group Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Volker Claus: Complexity Measures on Permutations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 Martin Dietzfelbinger, Friedheim Meyer auf der Heide: Dynamic Hashing in Real Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Ferdinand, Seidl, Wilhelm: Baumautomaten zur Codeselektion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121 Michael J. Fischer, Sophia A. Paleologou: Decision Making in the Presence of Noise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 B. Halstenberg, R. Reischuk: Uber den Nutzen von Orakelfragen bei nichtdeterministischen Kommunikationsprotokollen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169 Uwe Hinsberger, Reiner Kalla: Performance Optimization of Combinational Circuits . . . . . . . . . . . . . . . . . . . . . . . . . 185 Thomas Kretschmer: An Algebraic Characterization of Context-Free Languages . . . . . . . . . . . . . . . . . . . . 209 Juraj Hromkovi, Burkhard Monien: The Bisection Problem for Graphs of Degree 4 (Configuring Transputer Systems) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ."

Leben heiliger Weltleute - Leuchtende Vorbilder der Heiligkeit aud dem Volke und fur das Volk (German, Paperback): Johann... Leben heiliger Weltleute - Leuchtende Vorbilder der Heiligkeit aud dem Volke und fur das Volk (German, Paperback)
Johann Buchmann
R724 Discovery Miles 7 240 Ships in 10 - 15 working days
Praxis der Manuellen Medizin bei Sauglingen und Kindern - Technik der manualmedizinisch-osteopathischen Untersuchung und... Praxis der Manuellen Medizin bei Sauglingen und Kindern - Technik der manualmedizinisch-osteopathischen Untersuchung und Behandlung (German, Hardcover, 1. Aufl. 2017)
Irmgard Seifert, Thomas Schnellbacher, Johannes Buchmann
R2,207 Discovery Miles 22 070 Ships in 12 - 17 working days

Dieses Buch beschreibt ausfuhrlich die Techniken der manualmedizinisch-osteopathischen Untersuchung und Behandlung bei Sauglingen und Kindern im Kleinkind- und Schulalter. Der Schwerpunkt liegt dabei auf der Berucksichtigung der kindlichen Besonderheiten, abweichend von den Techniken beim Erwachsenen. Alle Techniken werden mit brillanten Fotos visualisiert. Prazise und didaktisch klar strukturierte Texte beschreiben fur jede Technik das "How-to-do" und bieten Vorschlage zu deren rationellem Einsatz. Damit ist das Buch ideal fur die systematische Einfuhrung in die Praxis und als Nachschlagewerk im klinischen Alltag von bei Kindern manualmedizinisch tatigen AErzten und Physiotherapeuten geeignet.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
To The Wolves - How Traitor Cops Crafted…
Caryn Dolley Paperback  (2)
R282 Discovery Miles 2 820
How Did We Get Here? - A Girl's Guide to…
Mpoomy Ledwaba Paperback  (1)
R290 R195 Discovery Miles 1 950
Kanker Schmanker!
Madelein Rust Paperback R320 R275 Discovery Miles 2 750
Broken To Heal - Deceit, Destruction…
Alistair Izobell Paperback R200 Discovery Miles 2 000
Expensive Poverty - Why Aid Fails And…
Greg Mills Paperback R360 R309 Discovery Miles 3 090
Atmosvuur
Jan Braai Hardcover R590 R425 Discovery Miles 4 250
1 Recce: Volume 3 - Through Stealth Our…
Alexander Strachan Paperback R360 R309 Discovery Miles 3 090
Twice The Glory - The Making Of The…
Lloyd Burnard, Khanyiso Tshwaku Paperback R325 R219 Discovery Miles 2 190
Herontdek Jou Selfvertroue - Sewe Stappe…
Rolene Strauss Paperback  (1)
R330 R284 Discovery Miles 2 840
Waterboy - Making Sense Of My Son's…
Glynis Horning Paperback R320 R250 Discovery Miles 2 500

 

Partners