|
|
Showing 1 - 8 of
8 matches in All Departments
Identity Based Encryption (IBE) is a type of public key encryption
and has been intensely researched in the past decade.
Identity-Based Encryption summarizes the available research for IBE
and the main ideas that would enable users to pursue further work
in this area. This book will also cover a brief background on
Elliptic Curves and Pairings, security against chosen Cipher text
Attacks, standards and more. Advanced-level students in computer
science and mathematics who specialize in cryptology, and the
general community of researchers in the area of cryptology and data
security will find Identity-Based Encryption a useful book.
Practitioners and engineers who work with real-world IBE schemes
and need a proper understanding of the basic IBE techniques, will
also find this book a valuable asset.
The purpose of An Introduction to Algorithmic Finance is to provide
a broad-based accessible introduction to three of the presently
most important areas of computational finance, namely, option
pricing, algorithmic trading and blockchain. This will provide a
basic understanding required for a career in the finance industry
and for doing more specialized courses in finance.An Introduction
to Algorithmic Finance breaks down into three parts. The first part
provides the necessary theoretical background to Derivatives,
Options and Stochastic Dominance. The second part covers various
algorithmic issues of finance, discussing specific algorithms,
their applications and consequences. The third part of the book is
devoted to blockchain and cryptocurrency which complements the
first two parts.An Introduction to Algorithmic Finance is an
interesting, important read for anyone interested in or invested in
the finance industry & it highlights and explains current
phenomena in algorithmic finance in an articulate manner.
|
Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
|
R2,936
Discovery Miles 29 360
|
Ships in 18 - 22 working days
|
The two-volume set LNCS 8873 and 8874 constitutes the refereed
proceedings of the 20th International Conference on the Theory and
Applications of Cryptology and Information Security, ASIACRYPT
2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised
full papers and two invited talks presented were carefully selected
from 255 submissions. They are organized in topical sections on
cryptology and coding theory; authenticated encryption; symmetric
key cryptanalysis; side channel analysis; hyperelliptic curve
cryptography; factoring and discrete log; cryptanalysis;
signatures; zero knowledge; encryption schemes; outsourcing and
delegation; obfuscation; homomorphic cryptography; secret sharing;
block ciphers and passwords; black-box separation; composability;
multi-party computation.
The two-volume set LNCS 8873 and 8874 constitutes the refereed
proceedings of the 20th International Conference on the Theory and
Applications of Cryptology and Information Security, ASIACRYPT
2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised
full papers and two invited talks presented were carefully selected
from 255 submissions. They are organized in topical sections on
cryptology and coding theory; authenticated encryption; symmetric
key cryptanalysis; side channel analysis; hyperelliptic curve
cryptography; factoring and discrete log; cryptanalysis;
signatures; zero knowledge; encryption schemes; outsourcing and
delegation; obfuscation; homomorphic cryptography; secret sharing;
block ciphers and passwords; black-box separation; composability;
multi-party computation.
Identity Based Encryption (IBE) is a type of public key encryption
and has been intensely researched in the past decade.
Identity-Based Encryption summarizes the available research for IBE
and the main ideas that would enable users to pursue further work
in this area. This book will also cover a brief background on
Elliptic Curves and Pairings, security against chosen Cipher text
Attacks, standards and more. Advanced-level students in computer
science and mathematics who specialize in cryptology, and the
general community of researchers in the area of cryptology and data
security will find Identity-Based Encryption a useful book.
Practitioners and engineers who work with real-world IBE schemes
and need a proper understanding of the basic IBE techniques, will
also find this book a valuable asset.
The two-volume set LNCS 8269 and 8270 constitutes the refereed
proceedings of the 19th International Conference on the Theory and
Application of Cryptology and Information, Asiacrypt 2013, held in
Bengaluru, India, in December 2013. The 54 revised full papers
presented were carefully selected from 269 submissions. They are
organized in topical sections named: zero-knowledge, algebraic
cryptography, theoretical cryptography, protocols, symmetric key
cryptanalysis, symmetric key cryptology: schemes and analysis,
side-channel cryptanalysis, message authentication codes,
signatures, cryptography based upon physical assumptions,
multi-party computation, cryptographic primitives, analysis,
cryptanalysis and passwords, leakage-resilient cryptography,
two-party computation, hash functions.
The two-volume set LNCS 8269 and 8270 constitutes the refereed
proceedings of the 19th International Conference on the Theory and
Application of Cryptology and Information, Asiacrypt 2013, held in
Bengaluru, India, in December 2013. The 54 revised full papers
presented were carefully selected from 269 submissions. They are
organized in topical sections named: zero-knowledge, algebraic
cryptography, theoretical cryptography, protocols, symmetric key
cryptanalysis, symmetric key cryptology: schemes and analysis,
side-channel cryptanalysis, message authentication codes,
signatures, cryptography based upon physical assumptions,
multi-party computation, cryptographic primitives, analysis,
cryptanalysis and passwords, leakage-resilient cryptography,
two-party computation, hash functions.
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002.The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Gloria
Sam Smith
CD
R174
R164
Discovery Miles 1 640
|