0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (2)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Algebraic Curves and Finite Fields - Cryptography and Other Applications (Hardcover, Digital original): Jeffrey D. Achter, Alp... Algebraic Curves and Finite Fields - Cryptography and Other Applications (Hardcover, Digital original)
Jeffrey D. Achter, Alp Bassa, Peter Beelen, Jung Hee Cheon; Contributions by Carlet Claude, …
R5,025 Discovery Miles 50 250 Ships in 10 - 15 working days

Algebra and number theory have always been counted among the most beautiful and fundamental mathematical areas with deep proofs and elegant results. However, for a long time they were not considered of any substantial importance for real-life applications. This has dramatically changed with the appearance of new topics such as modern cryptography, coding theory, and wireless communication. Nowadays we find applications of algebra and number theory frequently in our daily life. We mention security and error detection for internet banking, check digit systems and the bar code, GPS and radar systems, pricing options at a stock market, and noise suppression on mobile phones as most common examples. This book collects the results of the workshops "Applications of algebraic curves" and "Applications of finite fields" of the RICAM Special Semester 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world. They address old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,860 Discovery Miles 28 600 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised... Information Security and Cryptoloy - ICISC 2008 - 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers (Paperback, 2009 ed.)
Pil Joong Lee, Jung Hee Cheon
R1,449 Discovery Miles 14 490 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008.

The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.

Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings... Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jung Hee Cheon, Thomas Johansson
R1,473 Discovery Miles 14 730 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.

Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings... Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings (Paperback, 1st ed. 2021)
Jung Hee Cheon, Jean-Pierre Tillich
R2,486 Discovery Miles 24 860 Ships in 18 - 22 working days

This volume constitutes the proceedings of the 12th International Conference on post-quantum cryptography, PQCrypto 2021, held in Daejeon, South Korea in July 2021. The 25 full papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis.

Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part II (Paperback, 1st ed. 2015)
Tetsu Iwata, Jung Hee Cheon
R1,551 Discovery Miles 15 510 Ships in 18 - 22 working days

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,834 Discovery Miles 28 340 Ships in 18 - 22 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R170 R152 Discovery Miles 1 520
Die Verevrou
Jan van Tonder Paperback R385 R344 Discovery Miles 3 440
Prisoner 913 - The Release Of Nelson…
Riaan de Villiers, Jan-Ad Stemmet Paperback R542 Discovery Miles 5 420
Querying XML - XQuery, XPath, and…
Jim Melton, Stephen Buxton Paperback R1,479 Discovery Miles 14 790
Discourse Analysis and Applications…
Ronald L. Bloom, Loraine K. Obler, … Hardcover R4,498 Discovery Miles 44 980
Expensive Poverty - Why Aid Fails And…
Greg Mills Paperback R360 R326 Discovery Miles 3 260
Written Expression Disorders
N. Gregg Hardcover R4,094 Discovery Miles 40 940
Whose Peace? Critical Perspectives on…
M. Pugh, N. Cooper, … Hardcover R2,716 Discovery Miles 27 160
Entrepreneurship - And How To Establish…
Tersia Botha Paperback R282 Discovery Miles 2 820
Period Mappings and Period Domains
James Carlson, Stefan Muller-Stach, … Hardcover R2,662 Discovery Miles 26 620

 

Partners