0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Mathematical Foundations of Public Key Cryptography (Paperback): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Paperback)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R1,442 Discovery Miles 14 420 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

Mathematical Foundations of Public Key Cryptography (Hardcover): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Hardcover)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R2,431 Discovery Miles 24 310 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

5G+ - How 5G Change the Society (Paperback, 1st ed. 2021): Zhengmao Li, Xiaoyun Wang, Tongxu Zhang 5G+ - How 5G Change the Society (Paperback, 1st ed. 2021)
Zhengmao Li, Xiaoyun Wang, Tongxu Zhang
R3,710 Discovery Miles 37 100 Ships in 10 - 15 working days

This book takes China Mobile's "5G +" plan as the mainline, introduces three major scenarios, nine indicators, system architecture and basic principles of 5G, and systematically explains the essence of China Mobile's "5G +" for the first time. A lot of industry use cases and solutions are introduced for 5G to bring new changes to life, industries, and social governance. This book can benefit all readers who are interested in 5G. It also can be a reference for vertical industry partners to fully understand the possible applications of 5G. Most of all, it will help to promote all industries with new developments based on 5G's new kinetic energy.

5G+ - How 5G Change the Society (Hardcover, 1st ed. 2021): Zhengmao Li, Xiaoyun Wang, Tongxu Zhang 5G+ - How 5G Change the Society (Hardcover, 1st ed. 2021)
Zhengmao Li, Xiaoyun Wang, Tongxu Zhang
R5,271 Discovery Miles 52 710 Ships in 10 - 15 working days

This book takes China Mobile's "5G +" plan as the mainline, introduces three major scenarios, nine indicators, system architecture and basic principles of 5G, and systematically explains the essence of China Mobile's "5G +" for the first time. A lot of industry use cases and solutions are introduced for 5G to bring new changes to life, industries, and social governance. This book can benefit all readers who are interested in 5G. It also can be a reference for vertical industry partners to fully understand the possible applications of 5G. Most of all, it will help to promote all industries with new developments based on 5G's new kinetic energy.

Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings (Paperback, 2012 ed.)
Xiaoyun Wang, Kazue Sako
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings... Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings (Paperback)
Dongdai Lin, Gene Tsudik, Xiaoyun Wang
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing,... Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Tatsuaki Okamoto, Xiaoyun Wang
R1,794 Discovery Miles 17 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Advances in Cryptology -- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, Proceedings (Paperback, 2011 ed.)
Dong Hoon Lee, Xiaoyun Wang
R1,708 Discovery Miles 17 080 Ships in 10 - 15 working days

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Shaker Chair
Charles R. Muller Paperback R964 R772 Discovery Miles 7 720
Something Special For The Bride
Mary Hirose Paperback R195 Discovery Miles 1 950
Furniture in Architecture - The Work of…
Aidan Walker Hardcover R1,171 Discovery Miles 11 710
Knoll Home and Office Furniture
Nancy N. Schiffer Hardcover R2,446 R1,808 Discovery Miles 18 080
Antique Biedermeier Furniture
Rudolf Pressler Hardcover R1,266 R974 Discovery Miles 9 740
Best of Golden Oak Furniture: With…
Nancy N. Schiffer Paperback R914 R722 Discovery Miles 7 220
Fine Points of Furniture: Early American
Albert Sack Paperback R974 R782 Discovery Miles 7 820
Herman Miller Collection: The 1955/1956…
Leslie Pina Hardcover R1,236 R943 Discovery Miles 9 430
Conservation of Furniture
Shayne Rivers, Nick Umney Paperback R3,028 Discovery Miles 30 280
Magnificent 19th Century Furniture
Rainer Haaff Hardcover R3,793 R2,770 Discovery Miles 27 700

 

Partners