0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Algebraic Curves in Cryptography (Paperback): San Ling, Huaxiong Wang, Chaoping Xing Algebraic Curves in Cryptography (Paperback)
San Ling, Huaxiong Wang, Chaoping Xing
R1,876 Discovery Miles 18 760 Ships in 10 - 15 working days

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption. Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.

Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback,... Coding and Cryptology - Third International Workshop, IWCC 2011, Qingdao, China, May 30-June 3, 2011. Proceedings (Paperback, Edition.)
Yeow Meng Chee, Zhenbo Guo, San Ling, Fengjing Shao, Yuansheng Tang, …
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Workshop on Coding and Cryptology, IWCC 2011, held in Qingdao, China, May 30-June 3, 2011. The 19 revised full technical papers are contributed by the invited speakers of the workshop. The papers were carefully reviewed and cover a broad range of foundational and methodological as well as applicative issues in coding and cryptology, as well as related areas such as combinatorics.

Coding and Cryptology - Second International Workshop, IWCC 2009 (Paperback, 2009 ed.): Yeow Meng Chee, Chao Li, San Ling,... Coding and Cryptology - Second International Workshop, IWCC 2009 (Paperback, 2009 ed.)
Yeow Meng Chee, Chao Li, San Ling, Huaxiong Wang, Chaoping Xing
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

The biennial International Workshop on Coding and Cryptology (IWCC) aims to bring together many of the world's greatest minds in coding and crypt- ogy to share ideas and exchange knowledge related to advancements in c- ing and cryptology, amidst an informal setting conducive for interaction and collaboration. It is well known that fascinating connections exist between coding and cr- tology. Therefore this workshop series was organized to facilitate a fruitful - teraction and stimulating discourse among experts from these two areas. The inaugural IWCC was held at Wuyi Mountain, Fujian Province, China, during June 11-15, 2007 and attracted over 80 participants. Following this s- cess, the second IWCC was held June 1-5, 2009 at Zhangjiajie, Hunan Province, China. Zhangjiajie is one of the most scenic areas in China. The proceedings of this workshop consist of 21 technical papers, covering a wide range of topics in coding and cryptology, as well as related ?elds such as combinatorics. All papers, except one, are contributed by the invited speakers of the workshop and each paper has been carefully reviewed. We are grateful to the external reviewers for their help, which has greatly strengthened the quality of the proceedings. IWCC 2009 was co-organizedby the National University of Defense Techn- ogy (NUDT), China and Nanyang Technological University (NTU), Singapore. We acknowledge with gratitude the ?nancial support from NUDT. We wouldliketo expressourthanks to Springer formaking it possible forthe proceedings to be published in the Lecture Notes in Computer Science series.

Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings... Cryptology and Network Security - 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings (Paperback, 2007 ed.)
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing
R1,410 Discovery Miles 14 100 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Cryptology and Network Security, CANS 2007, held in Singapore, in December 2007.

The 17 revised full papers presented were carefully reviewed and selected from 68 submissions. The papers are organized in topical sections on signatures, network security, secure keyword search and private information retrieval, public key encryption, intrusion detection, email security, denial of service attacks, and authentication.

Coding Theory - A First Course (Hardcover): San Ling, Chaoping Xing Coding Theory - A First Course (Hardcover)
San Ling, Chaoping Xing
R3,470 Discovery Miles 34 700 Ships in 10 - 15 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Coding Theory - A First Course (Paperback): San Ling, Chaoping Xing Coding Theory - A First Course (Paperback)
San Ling, Chaoping Xing
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

Concerned with successfully transmitting data through a noisy channel, coding theory can be applied to electronic engineering and communications. Based on the authors' extensive teaching experience, this text provides a completely modern and accessible course on the subject. It includes sections on linear programming and decoding methods essential for contemporary mathematics. Numerous examples and exercises make the volume ideal for students and instructors.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Jackson Defeats Covid!
Tawanda Marbury Hardcover R534 Discovery Miles 5 340
Dance Team Double Trouble
Jake Maddox Hardcover R621 R561 Discovery Miles 5 610
My Friend Breath - Change Your Breath…
Meg Gillespie, Kelsey Corey Hardcover R539 R503 Discovery Miles 5 030
You Are A Champion Action Planner - 50…
Marcus Rashford Paperback R245 R222 Discovery Miles 2 220
Ratels Aan Die Lomba - Die Storie Van…
Leopold Scholtz Paperback  (4)
R295 R264 Discovery Miles 2 640
Nasty Women Talk Back - Feminist Essays…
Joy Watson Paperback  (2)
R290 Discovery Miles 2 900
The People's War - Reflections Of An ANC…
Charles Nqakula Paperback R325 R300 Discovery Miles 3 000
If Dreams Could Fly - Patience, Passion…
Maria Lei Antonio Hardcover R555 Discovery Miles 5 550
The Color Monster - A Story about…
Anna Llenas Board book R216 Discovery Miles 2 160
Lost On The Map - A Memoir Of Colonial…
Bryan Rostron Paperback R340 R314 Discovery Miles 3 140

 

Partners