0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Algebraic Curves and Finite Fields - Cryptography and Other Applications (Hardcover, Digital original): Jeffrey D. Achter, Alp... Algebraic Curves and Finite Fields - Cryptography and Other Applications (Hardcover, Digital original)
Jeffrey D. Achter, Alp Bassa, Peter Beelen, Jung Hee Cheon; Contributions by Carlet Claude, …
R5,025 Discovery Miles 50 250 Ships in 10 - 15 working days

Algebra and number theory have always been counted among the most beautiful and fundamental mathematical areas with deep proofs and elegant results. However, for a long time they were not considered of any substantial importance for real-life applications. This has dramatically changed with the appearance of new topics such as modern cryptography, coding theory, and wireless communication. Nowadays we find applications of algebra and number theory frequently in our daily life. We mention security and error detection for internet banking, check digit systems and the bar code, GPS and radar systems, pricing options at a stock market, and noise suppression on mobile phones as most common examples. This book collects the results of the workshops "Applications of algebraic curves" and "Applications of finite fields" of the RICAM Special Semester 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world. They address old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised... Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Pil Joong Lee, Jung Hee Cheon
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings... Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jung Hee Cheon, Thomas Johansson
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.

Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings... Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings (Paperback, 1st ed. 2021)
Jung Hee Cheon, Jean-Pierre Tillich
R2,486 Discovery Miles 24 860 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Tetsu Iwata, Jung Hee Cheon
R1,551 Discovery Miles 15 510 Ships in 18 - 22 working days

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,834 Discovery Miles 28 340 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Spelling and Writing Words - Theoretical…
Cyril Perret, Thierry Olive Hardcover R3,400 Discovery Miles 34 000
A Select Collection of Old Plays…
Robert Dodsley Paperback R641 Discovery Miles 6 410
De Profundis
Oscar Wilde Hardcover R597 Discovery Miles 5 970
Hykie Berg: My Storie van Hoop
Hykie Berg, Marissa Coetzee Paperback R265 R237 Discovery Miles 2 370
Handbook of Second and Foreign Language…
Rosa M Manchon, Paul Kei Matsuda Hardcover R7,174 Discovery Miles 71 740
The Skill and Art of Business Writing…
Harold Meyer Hardcover R2,549 Discovery Miles 25 490
Television and Screen Writing - From…
Richard A. Blum Hardcover R4,513 Discovery Miles 45 130
Swordfighting, for Writers, Game…
Guy Windsor Hardcover R1,292 Discovery Miles 12 920
Advice to the Teens; Or, Practical Helps…
Isaac Taylor Paperback R461 Discovery Miles 4 610
SAUK 1936-1995 - Bedreigde Spesie... Of…
Wynand Harmse Paperback R399 Discovery Miles 3 990

 

Partners