|
Showing 1 - 5 of
5 matches in All Departments
This book constitutes the refereed proceedings of the 18th
International Conference on Cryptology in India, INDOCRYPT 2017,
held in Chennai, India, in December 2017. The 19 revised full
papers presented in this book were carefully reviewed and selected
from 75 submissions. The focus of the conference includes works on
Public-Key Cryptography, Cryptographic Protocols, Side-Channel
Attacks, Implementation of Cryptographic Schemes, Functional
Encryption, Symmetric-Key Cryptanalysis, Foundations, and New
Cryptographic Constructions.
This book constitutes the refereed proceedings of the
Cryptographer's Track at the RSA Conference 2018, CT-RSA 2018, held
in San Francisco, CA, USA, in March 2018.The 26 papers presented in
this volume were carefully reviewed and selected from 79
submissions. CT-RSA is the track devoted to scientific papers on
cryptography, public-key to symmetric-key cryptography and from
crypto- graphic protocols to primitives and their implementation
security.
Beginning with a brief introduction to algorithms and diophantine equations, this volume provides a coherent modern account of the methods used to find all the solutions to certain diophantine equations, particularly those developed for use on a computer. The study is divided into three parts, emphasizing approaches with a wide range of applications. The first section considers basic techniques including local methods, sieving, descent arguments and the LLL algorithm. The second section explores problems that can be solved using Baker's theory of linear forms in logarithms. The final section looks at problems associated with curves, focusing on rational and integral points on elliptic curves. Each chapter concludes with a useful set of exercises. A detailed bibliography is included. This book will appeal to graduate students and research workers interested in solving diophantine equations using computational methods.
Beginning with a brief introduction to algorithms and diophantine equations, this volume provides a coherent modern account of the methods used to find all the solutions to certain diophantine equations, particularly those developed for use on a computer. The study is divided into three parts, emphasizing approaches with a wide range of applications. The first section considers basic techniques including local methods, sieving, descent arguments and the LLL algorithm. The second section explores problems that can be solved using Baker's theory of linear forms in logarithms. The final section looks at problems associated with curves, focusing on rational and integral points on elliptic curves. Each chapter concludes with a useful set of exercises. A detailed bibliography is included. This book will appeal to graduate students and research workers interested in solving diophantine equations using computational methods.
Since the appearance of the authors' first volume on elliptic curve
cryptography in 1999 there has been tremendous progress in the
field. In some topics, particularly point counting, the progress
has been spectacular. Other topics such as the Weil and Tate
pairings have been applied in new and important ways to
cryptographic protocols that hold great promise. Notions such as
provable security, side channel analysis and the Weil descent
technique have also grown in importance. This second volume
addresses these advances and brings the reader up to date.
Prominent contributors to the research literature in these areas
have provided articles that reflect the current state of these
important topics. They are divided into the areas of protocols,
implementation techniques, mathematical foundations and pairing
based cryptography. Each of the topics is presented in an
accessible, coherent and consistent manner for a wide audience that
will include mathematicians, computer scientists and engineers.
|
You may like...
Finding Dory
Ellen DeGeneres, Albert Brooks, …
Blu-ray disc
(1)
R42
Discovery Miles 420
|