You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This 2006 book introduces the theoretical foundations of error-correcting codes for senior-undergraduate to graduate students.
Many of the devices and systems used in modern industry are becoming progressively smaller and have reached the nanoscale domain. Nanofabrication aims at building nanoscale structures, which can act as components, devices, or systems, in large quantities at potentially low cost. Nanofabrication is vital to all nanotechnology fields, especially for the realization of nanotechnology that involves the traditional areas across engineering and science. This is the first book solely dedicated to the manufacturing technology in nanoscale structures, devices, and systems and is designed to satisfy the growing demands of researchers, professionals, and graduate students. Both conventional and non-con...
This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005. The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes.
A collection of survey articles by leading young researchers, showcasing the vitality of Russian mathematics.
The subject of Kleinian groups and hyperbolic 3-manifolds is currently undergoing explosively fast development. This volume contains important expositions on topics such as topology and geometry of 3-manifolds, curve complexes, classical Ahlfors-Bers theory and computer explorations. Researchers in these and related areas will find much of interest here.
Modern introduction to algebraic geometry for undergraduates; uses analytic ideas to access algebraic theory.
The only book to provide a unified view of the interplay between computational number theory and cryptography Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security. In this book, Song Y. Yang combines knowledge of these two critical fields, providing a unified view of the relationships between computational number theory and cryptography. The author takes an innovative approach, presenting mathematical ideas first, thereupon treating cryptography as an immediate application of the mathematical concepts. The book also presents topics from number theory, which are relevant for applications in public-key cryptog...
Many people do not realise that mathematics provides the foundation for the devices we use to handle information in the modern world. Most of those who do know probably think that the parts of mathematics involvedare quite ‘cl- sical’, such as Fourier analysis and di?erential equations. In fact, a great deal of the mathematical background is part of what used to be called ‘pure’ ma- ematics, indicating that it was created in order to deal with problems that originated within mathematics itself. It has taken many years for mathema- cians to come to terms with this situation, and some of them are still not entirely happy about it. Thisbookisanintegratedintroductionto Coding.Bythis Imea...
This book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type material for professional engineers and computer information specialists.
Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and format throughout and