|
Showing 1 - 8 of
8 matches in All Departments
This book contains high-quality papers presented at the First
International Forum on Financial Mathematics and Financial
Technology. With the rapid development of FinTech, the in-depth
integration between mathematics, finance and advanced technology is
the general trend. This book focuses on selected aspects of the
current and upcoming trends in FinTech. In detail, the included
scientific papers focus on financial mathematics and FinTech,
presenting the innovative mathematical models and state-of-the-art
technologies such as deep learning, with the aim to improve our
financial analysis and decision-making and enhance the quality of
financial services and risk control. The variety of the papers
delivers added value for both scholars and practitioners where they
will find perfect integration of elegant mathematical models and
up-to-date data mining technologies in financial market analysis.
This book contains high-quality papers presented at the First
International Forum on Financial Mathematics and Financial
Technology. With the rapid development of FinTech, the in-depth
integration between mathematics, finance and advanced technology is
the general trend. This book focuses on selected aspects of the
current and upcoming trends in FinTech. In detail, the included
scientific papers focus on financial mathematics and FinTech,
presenting the innovative mathematical models and state-of-the-art
technologies such as deep learning, with the aim to improve our
financial analysis and decision-making and enhance the quality of
financial services and risk control. The variety of the papers
delivers added value for both scholars and practitioners where they
will find perfect integration of elegant mathematical models and
up-to-date data mining technologies in financial market analysis.
This open access book covers the most cutting-edge and hot research
topics and fields of post-quantum cryptography. The main purpose of
this book is to focus on the computational complexity theory of
lattice ciphers, especially the reduction principle of Ajtai, in
order to fill the gap that post-quantum ciphers focus on the
implementation of encryption and decryption algorithms, but the
theoretical proof is insufficient. In Chapter 3, Chapter 4 and
Chapter 6, author introduces the theory and technology of LWE
distribution, LWE cipher and homomorphic encryption in detail. When
using random analysis tools, there is a problem of "ambiguity" in
both definition and algorithm. The greatest feature of this book is
to use probability distribution to carry out rigorous mathematical
definition and mathematical demonstration for various unclear or
imprecise expressions, so as to make it a rigorous theoretical
system for classroom teaching and dissemination. Chapters 5 and 7
further expand and improve the theory of cyclic lattice, ideal
lattice and generalized NTRU cryptography. This book is used as a
professional book for graduate students majoring in mathematics and
cryptography, as well as a reference book for scientific and
technological personnel engaged in cryptography research.
This open access book covers the most cutting-edge and hot research
topics and fields of post-quantum cryptography. The main purpose of
this book is to focus on the computational complexity theory of
lattice ciphers, especially the reduction principle of Ajtai, in
order to fill the gap that post-quantum ciphers focus on the
implementation of encryption and decryption algorithms, but the
theoretical proof is insufficient. In Chapter 3, Chapter 4 and
Chapter 6, author introduces the theory and technology of LWE
distribution, LWE cipher and homomorphic encryption in detail. When
using random analysis tools, there is a problem of "ambiguity" in
both definition and algorithm. The greatest feature of this book is
to use probability distribution to carry out rigorous mathematical
definition and mathematical demonstration for various unclear or
imprecise expressions, so as to make it a rigorous theoretical
system for classroom teaching and dissemination. Chapters 5 and 7
further expand and improve the theory of cyclic lattice, ideal
lattice and generalized NTRU cryptography. This book is used as a
professional book for graduate students majoring in mathematics and
cryptography, as well as a reference book for scientific and
technological personnel engaged in cryptography research.
This open access book systematically explores the statistical
characteristics of cryptographic systems, the computational
complexity theory of cryptographic algorithms and the mathematical
principles behind various encryption and decryption algorithms. The
theory stems from technology. Based on Shannon's information
theory, this book systematically introduces the information theory,
statistical characteristics and computational complexity theory of
public key cryptography, focusing on the three main algorithms of
public key cryptography, RSA, discrete logarithm and elliptic curve
cryptosystem. It aims to indicate what it is and why it is. It
systematically simplifies and combs the theory and technology of
lattice cryptography, which is the greatest feature of this book.
It requires a good knowledge in algebra, number theory and
probability statistics for readers to read this book. The senior
students majoring in mathematics, compulsory for cryptography and
science and engineering postgraduates will find this book helpful.
It can also be used as the main reference book for researchers in
cryptography and cryptographic engineering areas.
This open access book is the documentary of the Second
International Forum on Financial Mathematics and Financial
Technology, with focus on selected aspects of the current and
upcoming trends in FinTech. In detail, the included scientific
papers cover financial mathematics and FinTech, presenting the
innovative mathematical models and state-of-the-art technologies
such as deep learning, with the aim to improve the financial
analysis and decision-making and enhance the quality of financial
services and risk control. The variety of the papers delivers added
value for both scholars and practitioners where they will find
perfect integration of elegant mathematical models and up-to-date
data mining technologies in financial market analysis. Due to
COVID-19, the conference was held virtually on August 13–15,
2021, jointly held by the School of Mathematics of Renmin
University of China, the Engineering Research Center of Financial
Computing and Digital Engineering of Ministry of Education, the
Statistics and Big Data Research Institute of Renmin University of
China, the Blockchain Research Institute of Renmin University of
China, the Zhongguancun Internet Finance Research Institute, and
the Renmin University Press.
This open access book is the documentary of the Second
International Forum on Financial Mathematics and Financial
Technology, with focus on selected aspects of the current and
upcoming trends in FinTech. In detail, the included scientific
papers cover financial mathematics and FinTech, presenting the
innovative mathematical models and state-of-the-art technologies
such as deep learning, with the aim to improve the financial
analysis and decision-making and enhance the quality of financial
services and risk control. The variety of the papers delivers added
value for both scholars and practitioners where they will find
perfect integration of elegant mathematical models and up-to-date
data mining technologies in financial market analysis. Due to
COVID-19, the conference was held virtually on August 13–15,
2021, jointly held by the School of Mathematics of Renmin
University of China, the Engineering Research Center of Financial
Computing and Digital Engineering of Ministry of Education, the
Statistics and Big Data Research Institute of Renmin University of
China, the Blockchain Research Institute of Renmin University of
China, the Zhongguancun Internet Finance Research Institute, and
the Renmin University Press.
This open access book systematically explores the statistical
characteristics of cryptographic systems, the computational
complexity theory of cryptographic algorithms and the mathematical
principles behind various encryption and decryption algorithms. The
theory stems from technology. Based on Shannon's information
theory, this book systematically introduces the information theory,
statistical characteristics and computational complexity theory of
public key cryptography, focusing on the three main algorithms of
public key cryptography, RSA, discrete logarithm and elliptic curve
cryptosystem. It aims to indicate what it is and why it is. It
systematically simplifies and combs the theory and technology of
lattice cryptography, which is the greatest feature of this book.
It requires a good knowledge in algebra, number theory and
probability statistics for readers to read this book. The senior
students majoring in mathematics, compulsory for cryptography and
science and engineering postgraduates will find this book helpful.
It can also be used as the main reference book for researchers in
cryptography and cryptographic engineering areas.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Ab Wheel
R209
R149
Discovery Miles 1 490
|