0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Mathematical Foundations of Public Key Cryptography (Paperback): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Paperback)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R1,442 Discovery Miles 14 420 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

Mathematical Foundations of Public Key Cryptography (Hardcover): Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng Mathematical Foundations of Public Key Cryptography (Hardcover)
Xiaoyun Wang, Guangwu Xu, Mingqiang Wang, Xianmeng Meng
R2,431 Discovery Miles 24 310 Ships in 12 - 17 working days

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography. Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography-revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms. Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis. The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained. Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm-the LLL algorithm and its application in the cryptanalysis of the RSA algorithm. Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

5G+ - How 5G Change the Society (Paperback, 1st ed. 2021): Zhengmao Li, Xiaoyun Wang, Tongxu Zhang 5G+ - How 5G Change the Society (Paperback, 1st ed. 2021)
Zhengmao Li, Xiaoyun Wang, Tongxu Zhang
R3,710 Discovery Miles 37 100 Ships in 10 - 15 working days

This book takes China Mobile's "5G +" plan as the mainline, introduces three major scenarios, nine indicators, system architecture and basic principles of 5G, and systematically explains the essence of China Mobile's "5G +" for the first time. A lot of industry use cases and solutions are introduced for 5G to bring new changes to life, industries, and social governance. This book can benefit all readers who are interested in 5G. It also can be a reference for vertical industry partners to fully understand the possible applications of 5G. Most of all, it will help to promote all industries with new developments based on 5G's new kinetic energy.

5G+ - How 5G Change the Society (Hardcover, 1st ed. 2021): Zhengmao Li, Xiaoyun Wang, Tongxu Zhang 5G+ - How 5G Change the Society (Hardcover, 1st ed. 2021)
Zhengmao Li, Xiaoyun Wang, Tongxu Zhang
R5,271 Discovery Miles 52 710 Ships in 10 - 15 working days

This book takes China Mobile's "5G +" plan as the mainline, introduces three major scenarios, nine indicators, system architecture and basic principles of 5G, and systematically explains the essence of China Mobile's "5G +" for the first time. A lot of industry use cases and solutions are introduced for 5G to bring new changes to life, industries, and social governance. This book can benefit all readers who are interested in 5G. It also can be a reference for vertical industry partners to fully understand the possible applications of 5G. Most of all, it will help to promote all industries with new developments based on 5G's new kinetic energy.

Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012, Proceedings (Paperback, 2012 ed.)
Xiaoyun Wang, Kazue Sako
R1,715 Discovery Miles 17 150 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings... Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, Proceedings (Paperback)
Dongdai Lin, Gene Tsudik, Xiaoyun Wang
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.

Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing,... Public Key Cryptography - PKC 2007 - 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings (Paperback, 2007 ed.)
Tatsuaki Okamoto, Xiaoyun Wang
R1,794 Discovery Miles 17 940 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.

The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.

Advances in Cryptology -- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology -- ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011, Proceedings (Paperback, 2011 ed.)
Dong Hoon Lee, Xiaoyun Wang
R1,708 Discovery Miles 17 080 Ships in 10 - 15 working days

This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Vusi - Business & Life Lessons From a…
Vusi Thembekwayo Paperback  (3)
R310 R266 Discovery Miles 2 660
Winged Messenger - Running Your First…
Bruce Fordyce Paperback  (1)
R220 R172 Discovery Miles 1 720
Ongeskonde
Alwyn Uys Paperback R240 R206 Discovery Miles 2 060
A Handful Of Summers
Gordon Forbes Paperback  (1)
R563 R511 Discovery Miles 5 110
Killing Karoline - A Memoir
Sara-Jayne King Paperback  (1)
R325 R279 Discovery Miles 2 790
Mission Of Malice - My Exodus From…
Erika Bornman Paperback  (8)
R260 R208 Discovery Miles 2 080
Albertina Sisulu
Sindiwe Magona, Elinor Sisulu Paperback R200 R172 Discovery Miles 1 720
Sweat Scale Sell - Build Your Business…
Pavlo Phitidis Paperback R320 R250 Discovery Miles 2 500
Women In Solitary - Inside The Female…
Shanthini Naidoo Paperback  (1)
R355 R305 Discovery Miles 3 050
I Am Costa - From Meth To Marathons
Costa Carastavrakis Paperback R280 R219 Discovery Miles 2 190

 

Partners