You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 7th Italian Conference on Theoretical Computer Science, ICTCS 2001, held in Torino, Italy in October 2001. The 25 revised full papers presented together with two invited papers were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on lambda calculus and types, algorithms and data structures, new computing paradigms, formal languages, objects and mobility, computational complexitiy, security, and logics and logic programming.
This book constitutes the refereed proceedings of the 11th International Workshop on Fast Software Encryption, FSE 2004, held in Delhi, India in February 2004. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on algebraic attacks, stream cipher cryptanalysis, Boolean functions, stream cipher design, design and analysis of block ciphers, cryptographic primitives-theory, modes of operation, and analysis of MACs and hash functions.
This book constitutes the refereed proceedings of the 11th International Workshop on Fast Software Encryption, FSE 2004, held in Delhi, India in February 2004. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on algebraic attacks, stream cipher cryptanalysis, Boolean functions, stream cipher design, design and analysis of block ciphers, cryptographic primitives-theory, modes of operation, and analysis of MACs and hash functions.
Contact in Structural Mechanics treats the problem of contact in the context of large deformations and the Coulomb friction law. The proposed formulation is based on a weak form that generalizes the classical principle of virtual powers in the sense that the weak form also encompasses all the contact laws. This formulation is thus a weighted residue method and has the advantage of being amenable to a standard finite element discretization. This book provides the reader with a detailed description of contact kinematics and the variation calculus of kinematic quantities, two essential subjects for any contact study. The numerical resolution is carried out in statics and dynamics. In both cases, the derivation of the contact tangent matrix – an essential ingredient for iterative calculation – is explained in detail. Several numerical examples are presented to illustrate the efficiency of the method.
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.
This book constitutes the proceedings of the 17th International Workshop on Fast Software Encryption, held in Seoul, Korea, in February 2010.
This book contains thoroughly refereed and revised papers from the 8th International Andrei Ershov Memorial Conference on Perspectives of System Informatics, PSI 2011, held in Akademgorodok, Novosibirsk, Russia, in June/July 2011. The 18 revised full papers and 10 revised short papers presented were carefully reviewed and selected from 60 submissions. The volume also contains 5 invited papers covering a range of hot topics in computer science and informatics. The papers are organized in topical sections on foundations of program and system development and analysis, partial evaluation, mixed computation, abstract interpretation, compiler construction, computer models and algorithms for bioinformatics, programming methodology and software engineering, information technologies, knowledge-based systems, and knowledge engineering.
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communication of Korea.
This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006. Presents 27 revised full papers addressing all current aspects of fast and secure primitives for symmetric cryptology, and organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds.
The purpose of this book is to serve as a tool for researchers and practitioners who apply Lie algebras and Lie groups to solve problems arising in science and engineering. The authors address the problem of expressing a Lie algebra obtained in some arbitrary basis in a more suitable basis in which all essential features of the Lie algebra are directly visible. This includes algorithms accomplishing decomposition into a direct sum, identification of the radical and the Levi decomposition, and the computation of the nilradical and of the Casimir invariants. Examples are given for each algorithm. For low-dimensional Lie algebras this makes it possible to identify the given Lie algebra complete...