0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (10)
  • R2,500 - R5,000 (8)
  • -
Status
Brand

Showing 1 - 18 of 18 matches in All Departments

International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Hardcover, 1st ed. 2021):... International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Hardcover, 1st ed. 2021)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R1,583 Discovery Miles 15 830 Ships in 12 - 17 working days

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018): Tsuyoshi Takagi,... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Hardcover, 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R4,313 Discovery Miles 43 130 Ships in 10 - 15 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

The Impact of Applications on Mathematics - Proceedings of the Forum of Mathematics for Industry 2013 (Hardcover, 2014): Masato... The Impact of Applications on Mathematics - Proceedings of the Forum of Mathematics for Industry 2013 (Hardcover, 2014)
Masato Wakayama, Robert S. Anderssen, Jin Cheng, Yasuhide Fukumoto, Robert McKibbin, …
R2,854 Discovery Miles 28 540 Ships in 10 - 15 working days

This book is a collection of papers presented at the Forum The Impact of Applications on Mathematics in October 2013. It describes an appropriate framework in which to highlight how real-world problems, over the centuries and today, have influenced and are influencing the development of mathematics and thereby, how mathematics is reshaped, in order to advance mathematics and its application. The contents of this book address productive and successful interaction between industry and mathematicians, as well as the cross-fertilization and collaboration that result when mathematics is involved with the advancement of science and technology."

International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Paperback, 1st ed. 2021):... International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 (Paperback, 1st ed. 2021)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R1,347 Discovery Miles 13 470 Ships in 10 - 15 working days

This open access book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), which was held on September 25-27, 2019 in Fukuoka, Japan. The international symposium MQC addresses the mathematics and quantum theory underlying secure modeling of the post quantum cryptography including e.g. mathematical study of the light-matter interaction models as well as quantum computing. The security of the most widely used RSA cryptosystem is based on the difficulty of factoring large integers. However, in 1994 Shor proposed a quantum polynomial time algorithm for factoring integers, and the RSA cryptosystem is no longer secure in the quantum computing model. This vulnerability has prompted research into post-quantum cryptography using alternative mathematical problems that are secure in the era of quantum computers. In this regard, the National Institute of Standards and Technology (NIST) began to standardize post-quantum cryptography in 2016. This book is suitable for postgraduate students in mathematics and computer science, as well as for experts in industry working on post-quantum cryptography.

Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Paperback, Softcover reprint of the... Mathematical Modelling for Next-Generation Cryptography - CREST Crypto-Math Project (Paperback, Softcover reprint of the original 1st ed. 2018)
Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, …
R3,052 Discovery Miles 30 520 Ships in 10 - 15 working days

This book presents the mathematical background underlying security modeling in the context of next-generation cryptography. By introducing new mathematical results in order to strengthen information security, while simultaneously presenting fresh insights and developing the respective areas of mathematics, it is the first-ever book to focus on areas that have not yet been fully exploited for cryptographic applications such as representation theory and mathematical physics, among others. Recent advances in cryptanalysis, brought about in particular by quantum computation and physical attacks on cryptographic devices, such as side-channel analysis or power analysis, have revealed the growing security risks for state-of-the-art cryptographic schemes. To address these risks, high-performance, next-generation cryptosystems must be studied, which requires the further development of the mathematical background of modern cryptography. More specifically, in order to avoid the security risks posed by adversaries with advanced attack capabilities, cryptosystems must be upgraded, which in turn relies on a wide range of mathematical theories. This book is suitable for use in an advanced graduate course in mathematical cryptography, while also offering a valuable reference guide for experts.

Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings... Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings (Paperback, 1st ed. 2018)
Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Frontiers in Cyber Security, held in Chengdu, China, in November 2018. The 18 full papers along with the3 short papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections, namely: symmetric key cryptography, public key cryptography, post-quantum cryptography, cloud security and data deduplication, access control, attack and behavior detection, system and network security, security design.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R3,014 Discovery Miles 30 140 Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Jung Hee Cheon, Tsuyoshi Takagi
R2,985 Discovery Miles 29 850 Ships in 10 - 15 working days

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings (Paperback,... Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012, Proceedings (Paperback, 2012 ed.)
Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu
R1,486 Discovery Miles 14 860 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 16 full papers and 4 short papers presented were carefully reviewed and selected from 66 submissions. The papers are grouped in topical sections on signature schemes, foundations, leakage resilence and key escrow, encryption schemes, and information theoretical security.

Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007,... Pairing-Based Cryptography - Pairing 2007 - First International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings (Paperback, 2007 ed.)
Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto
R1,507 Discovery Miles 15 070 Ships in 10 - 15 working days

This book represents the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in July 2007.

The 18 revised full papers presented together with 2 abstracts and 3 full papers of invited talks were carefully reviewed and selected from 86 submissions. The papers are organized in topcial sections on applications, certificateless public key encryption, hyperelliptic curves, implementation, cryptographic protocols, cryptanalysis, and cryptographic algorithms.

Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1,... Cryptographic Hardware and Embedded Systems -- CHES 2011 - 13th International Workshop, Nara, Japan, September 28 -- October 1, 2011, Proceedings (Paperback)
Bart Preneel, Tsuyoshi Takagi
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R2,829 Discovery Miles 28 290 Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings... Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings (Paperback, 1st ed. 2016)
Tsuyoshi Takagi
R2,221 Discovery Miles 22 210 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 7th International Workshop on Post-Quantum Cryptography, PQCrypto 2016, held in Fukuoka, Japan, in February 2016. The 16 revised full papers presented were carefully reviewed and selected from 42 submissions. The papers cover all technical aspects of multivariate polynomial cryptography, code-based cryptography, lattice-based cryptography, quantum algorithms, post-quantum protocols, and implementations.

Contemporary Cryptology (Paperback, 2005 ed.): Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David... Contemporary Cryptology (Paperback, 2005 ed.)
Dario Catalano, Ronald Cramer, Ivan Damgard, Giovanni Di Crescenzo, David Pointcheval, …
R1,588 Discovery Miles 15 880 Ships in 10 - 15 working days

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes:
- efficient distributed computation modulo a shared secret
- multiparty computation
- foundations of modern cryptography
- provable security for public key schemes
- efficient and secure public-key cryptosystems.

Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October... Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009 Toyama, Japan, October 28-30, 2009 Proceedings (Paperback, 2009 ed.)
Tsuyoshi Takagi, Masahiro Mambo
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

The Fourth International Workshop on Security (IWSEC 2009) was held at Toyama International Conference Center, Toyama, Japan, October 28-30, 2009. The workshop was co-organized by CSEC, a special interest group on computer security of the IPSJ (Information Processing Society of Japan) and ISEC, a technical group on information security of IEICE (The Institute of Electronics, Information and Communication Engineers). The excellent Local Organizing Committee was led by the IWSEC 2009 General Co-chairs, Kazuo Takaragi and Hiroaki Kikuchi. IWSEC2009received46papersubmissionsfromallovertheworld.Wewould like to thank all the authors who submitted papers. Eachpaper was reviewedby at least three reviewers. In addition to the Program Committee members, many externalreviewersjoinedthereviewprocessintheirparticularareasofexpertise. We were fortunate to have this energetic team of experts, and are grateful to all of them for their hard work. The hard work includes very active discussion; the discussion phase was almost as long as the initial individual reviewing. The review and discussion were supported by a very nice Web-based system, iChair. We thank its developers. Following the review phases, 13 papers were accepted for publication in this volume of Advances in Information and Computer Security. Together with the contributed papers, the workshop featured an invited talk and a hash function panel both of which were respectively given and chaired by eminent researcher, Bart Preneel (Katholieke Universiteit Leuven). An abstract of the talk, titled "TheFutureofCryptographicAlgorithms,"isincludedinthisvolume.Wedeeply appreciate his contribution. Many people contributed to the success of IWSEC 2009. We wish to - press our deep appreciation for their contribution to information and computer security.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R3,188 Discovery Miles 31 880 Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R1,594 Discovery Miles 15 940 Ships in 10 - 15 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings... Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Tanja Lange, Tsuyoshi Takagi
R2,680 Discovery Miles 26 800 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Workshop on Post-Quantum Cryptography, PQCrypto 2017, held in Utrecht, The Netherlands, in June 2017. The 23 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on code-based cryptography, isogeny-based cryptography, lattice-based cryptography, multivariate cryptography, quantum algorithms, and security models.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cancers in People with HIV and AIDS…
Robert Yarchoan Hardcover R5,348 R4,887 Discovery Miles 48 870
AIDS and the Body Politic - Biomedicine…
Catherine Waldby Paperback R1,208 Discovery Miles 12 080
Biomedical Ethics Reviews * 1988
James M. Humber, Robert F Almeder Hardcover R1,570 Discovery Miles 15 700
The Impact of Aids - Psychological and…
Lorraine Sherr, Barbara Hedge, … Paperback R1,262 Discovery Miles 12 620
AIDS and Intravenous Drug Use - The…
M.Daniel Fernando Hardcover R2,145 Discovery Miles 21 450
Prostitutes in Medical Literature - An…
Sachi Sri Kantha Hardcover R2,036 Discovery Miles 20 360
AIDS and the Body Politic - Biomedicine…
Catherine Waldby Hardcover R3,979 Discovery Miles 39 790
Drug Injecting and HIV Infection
Andrew Ball, Don C. Des Jarlais, … Hardcover R2,608 Discovery Miles 26 080
AIDS, Drugs and Prevention
Richard Hartnoll, Tim Rhodes Hardcover R5,138 Discovery Miles 51 380
Sex, Disease, and Society - A…
Milton Lewis, Scott Bamber, … Hardcover R2,710 Discovery Miles 27 100

 

Partners