Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cryptology and Network Security
  • Language: en
  • Pages: 393

Cryptology and Network Security

This book constitutes the refereed proceedings of the 21st International Conference on Cryptology and Network Security, CANS 2022, which was held during November 13-16, 2022. The conference was took place in Abu Dhabi, United Arab Emirates. The 18 full and 2 short papers presented in these proceedings were carefully reviewed and selected from 54 submissions. They were organized in topical sections as follows: zero-knowledge and MPC; public-key infrastructure; attacks and countermeasures; cryptanalysis and provable security; cryptographic protocols; blockchain and payment systems; and codes and post-quantum cryptography.

Eurocode ’92
  • Language: en
  • Pages: 388

Eurocode ’92

  • Type: Book
  • -
  • Published: 2014-05-04
  • -
  • Publisher: Springer

This book is made of the proceedings of EUROCODE 1992 which was held in Udine (Italy) at the CISM, October 27 - 30, 1992. EUROCODE ’92 is a continuation as well as an extension of the previous colloquia Trois Journèes sur le codage and EUROCODE ’90, whose proceedings appeared as Lecture Notes in Computer Science (Volumes 388 and 514). The aim of EUROCODE ’92 was to attract high level research papers and to encourage interchange of ideas among the areas of coding theory and related fields which share the same tools for applications in the science of communications, theoretical computer science, software engineering and mathematics. Then the book is characterized by a very broad spectrum, ranging from combinatories or algebraic geometry to implementation of coding algorithms. There were about 90 participants to the conference, from the academic and industrial worlds; 53 conferences were selected. The submitted full-papers were separately refereed for publication by at least two international referees.

Coding and Cryptography
  • Language: en
  • Pages: 452

Coding and Cryptography

  • Type: Book
  • -
  • Published: 2006-11-17
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-proceedings of the International Workshop on Coding and Cryptography, WCC 2005, held in Bergen, Norway, in March 2005. The 33 revised full papers were carefully reviewed and selected during two rounds of review. The papers address all aspects of coding theory, cryptography and related areas, theoretical or applied.

Sphere Packings, Lattices and Groups
  • Language: en
  • Pages: 778

Sphere Packings, Lattices and Groups

The third edition of this definitive and popular book continues to pursue the question: what is the most efficient way to pack a large number of equal spheres in n-dimensional Euclidean space? The authors also examine such related issues as the kissing number problem, the covering problem, the quantizing problem, and the classification of lattices and quadratic forms. There is also a description of the applications of these questions to other areas of mathematics and science such as number theory, coding theory, group theory, analogue-to-digital conversion and data compression, n-dimensional crystallography, dual theory and superstring theory in physics. New and of special interest is a report on some recent developments in the field, and an updated and enlarged supplementary bibliography with over 800 items.

Covering Codes
  • Language: en
  • Pages: 565

Covering Codes

  • Type: Book
  • -
  • Published: 1997-04-14
  • -
  • Publisher: Elsevier

The problems of constructing covering codes and of estimating their parameters are the main concern of this book. It provides a unified account of the most recent theory of covering codes and shows how a number of mathematical and engineering issues are related to covering problems.Scientists involved in discrete mathematics, combinatorics, computer science, information theory, geometry, algebra or number theory will find the book of particular significance. It is designed both as an introductory textbook for the beginner and as a reference book for the expert mathematician and engineer.A number of unsolved problems suitable for research projects are also discussed.

Cryptographic Hardware and Embedded Systems -- CHES 2011
  • Language: en
  • Pages: 537

Cryptographic Hardware and Embedded Systems -- CHES 2011

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Progress in Cryptology – AFRICACRYPT 2014
  • Language: en
  • Pages: 487

Progress in Cryptology – AFRICACRYPT 2014

  • Type: Book
  • -
  • Published: 2014-05-21
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols and Lattice-based Cryptography.

Public-Key Cryptography -- PKC 2015
  • Language: en
  • Pages: 820

Public-Key Cryptography -- PKC 2015

  • Type: Book
  • -
  • Published: 2015-03-16
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.

Post-Quantum Cryptography
  • Language: en
  • Pages: 292

Post-Quantum Cryptography

  • Type: Book
  • -
  • Published: 2014-09-25
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, held in Waterloo, ON, Canada, in October 2014. The 16 revised full papers presented were carefully reviewed and selected from 37 submissions. The papers cover all technical aspects of cryptographic research related to the future world with large quantum computers such as code-based cryptography, lattice-based cryptography, multivariate cryptography, isogeny-based cryptography, security proof frameworks, cryptanalysis and implementations.

Post-Quantum Cryptography
  • Language: en
  • Pages: 523

Post-Quantum Cryptography

This volume constitutes the proceedings of the 13th International Conference on post-quantum cryptography, PQCrypto 2022, held in as a Virtual Event in September 2022. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. They cover a broad spectrum of research within the conference's scope, including code-, hash-, isogeny-, and lattice-based cryptography, multivariate cryptography, and quantum cryptanalysis. The papers are categorized in the following topical sub-headings: Code-Based Cryptography; Multivariate Cryptography and the MinRank Problem; Quantum Algorithims, Attacks and Models; Implementation and Side Channel Attacks; Isogeny; Lattice-based Cryptography; Cryptanalysis.