You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Self-organized criticality (SOC) has become a magic word in various scientific disciplines; it provides a framework for understanding complexity and scale invariance in systems showing irregular fluctuations. In the first 10 years after Per Bak and his co-workers presented their seminal idea, more than 2000 papers on this topic appeared. Seismology has been a field in earth sciences where the SOC concept has already deepened the understanding, but there seem to be much more examples in earth sciences where applying the SOC concept may be fruitful. After introducing the reader into the basics of fractals, chaos and SOC, the book presents established and new applications of SOC in earth sciences, namely earthquakes, forest fires, landslides and drainage networks.
This book constitutes the refereed proceedings of the 4th International Algorithmic Number Theory Symposium, ANTS-IV, held in Leiden, The Netherlands, in July 2000. The book presents 36 contributed papers which have gone through a thorough round of reviewing, selection and revision. Also included are 4 invited survey papers. Among the topics addressed are gcd algorithms, primality, factoring, sieve methods, cryptography, linear algebra, lattices, algebraic number fields, class groups and fields, elliptic curves, polynomials, function fields, and power sums.
This book constitutes the refereed proceedings of the 6th International Algorithmic Number Theory Symposium, ANTS 2004, held in Burlington, VT, USA, in June 2004. The 30 revised full papers presented together with 3 invited papers were carefully reviewed and selected for inclusion in the book. Among the topics addressed are zeta functions, elliptic curves, hyperelliptic curves, GCD algorithms, number field computations, complexity, primality testing, Weil and Tate pairings, cryptographic algorithms, function field sieve, algebraic function field mapping, quartic fields, cubic number fields, lattices, discrete logarithms, and public key cryptosystems.
This volume consists of a selection of papers based on presentations made at the international conference on number theory held in honor of Hugh Williams' sixtieth birthday. The papers address topics in the areas of computational and explicit number theory and its applications. The material is suitable for graduate students and researchers interested in number theory.
This book constitutes the proceedings of the 7th International Conference on Mathematical Software, ICMS 2020, held in Braunschweig, Germany, in July 2020. The 48 papers included in this volume were carefully reviewed and selected from 58 submissions. The program of the 2020 meeting consisted of 20 topical sessions, each of which providing an overview of the challenges, achievements and progress in a environment of mathematical software research, development and use.
The advent of mathematical software has been one of the most important events in mathematics. Mathematical software systems are used to construct examples, to prove theorems, and to find new mathematical phenomena. On the other hand, mathematical research often motivates developments of new algorithms and new systems.This volume contains the papers presented at the First International Congress of Mathematical Software, which aimed at a coherent study of mathematical software systems from a wide variety of branches of mathematics. The book discusses more than one hundred mathematical software systems. Readers can get an overview of the current status of the arts of mathematical software and algorithms.The proceedings have been selected for coverage in: • Index to Scientific & Technical Proceedings (ISTP CDROM version / ISI Proceedings)
The book deals with algorithmic problems related to binary quadratic forms. It uniquely focuses on the algorithmic aspects of the theory. The book introduces the reader to important areas of number theory such as diophantine equations, reduction theory of quadratic forms, geometry of numbers and algebraic number theory. The book explains applications to cryptography and requires only basic mathematical knowledge. The author is a world leader in number theory.
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.
The two-volume set LNCS 10769 and 10770 constitutes the refereed proceedings of the 21st IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2018, held in Rio de Janeiro, Brazil, in March 2018. The 49 revised papers presented were carefully reviewed and selected from 186 submissions. They are organized in topical sections such as Key-Dependent-Message and Selective-Opening Security; Searchable and Fully Homomorphic Encryption; Public-Key Encryption; Encryption with Bad Randomness; Subversion Resistance; Cryptanalysis; Composable Security; Oblivious Transfer; Multiparty Computation; Signatures; Structure-Preserving Signatures; Functional Encryption; Foundations; Obfuscation-Based Cryptographic Constructions; Protocols; Blockchain; Zero-Knowledge; Lattices.