Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Advanced Encryption Standard - AES
  • Language: en
  • Pages: 198

Advanced Encryption Standard - AES

This book constítutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on cryptanalytic attacks and related topics, algebraic attacks and related results, hardware implementations, and other topics. All in all, the papers constitute a most up-to-date assessment of the state of the art of data encryption using the Advanced Encryption Standard AES, the de facto world standard for data encryption.

Topics in Finite Fields
  • Language: en
  • Pages: 386

Topics in Finite Fields

This volume contains the proceedings of the 11th International Conference on Finite Fields and their Applications (Fq11), held July 22-26, 2013, in Magdeburg, Germany. Finite Fields are fundamental structures in mathematics. They lead to interesting deep problems in number theory, play a major role in combinatorics and finite geometry, and have a vast amount of applications in computer science. Papers in this volume cover these aspects of finite fields as well as applications in coding theory and cryptography.

Fast Software Encryption
  • Language: en
  • Pages: 388

Fast Software Encryption

This book contains a set of revised refereed papers selected from the presentations at the Second International Workshop on Fast Software Encryption held in Leuven, Belgium, in December 1994. The 28 papers presented significantly advance the state of the art of software algorithms for two cryptographic primitives requiring very high speeds, namely encryption algorithms and hash functions: this volume contains six proposals for new ciphers as well as new results on the security of the new proposals. In addition, there is an introductory overview by the volume editor. The papers are organized in several sections on stream ciphers and block ciphers; other papers deal with new algorithms and protocols or other recent results.

Tradition and Innovation in Folk Literature
  • Language: en
  • Pages: 318

Tradition and Innovation in Folk Literature

  • Type: Book
  • -
  • Published: 2015-08-11
  • -
  • Publisher: Routledge

In this book, first published in 1987, Wolfgang Mieder follows the intriguing trail of some of the best known pieces of folk literature, tracing them from their roots to modern uses in advertising, journalism, politics, cartoons, and poetry. He reveals both the remarkable adaptability of these tales and how each variation reflects cultural and historical changes. Fairy tales, legends, folk songs, riddles, nursery rhymes, and proverbs are passed from generation to generation, changing both in form and meaning with each use. This book will be of interest to students of literature.

Selected Areas in Cryptography
  • Language: en
  • Pages: 371

Selected Areas in Cryptography

  • Type: Book
  • -
  • Published: 2006-02-26
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Canada in August 2005. The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusion in the book. The papers are organized in topical sections.

Sequences and Their Applications - SETA 2004
  • Language: en
  • Pages: 451

Sequences and Their Applications - SETA 2004

  • Type: Book
  • -
  • Published: 2005-05-20
  • -
  • Publisher: Springer

This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications (SETA 2004), held in Seoul, Korea during October 24–28, 2004. The previous two conferences, SETA 1998 and SETA 2001, were held in Singapore and Bergen, Norway, respectively. These conferences are motivated by the many widespread applications of sequences in modern communication systems. These applications include pseudorandom sequences in spread spectrum systems, code-division multiple-access, stream ciphers in cryptography and several connections to coding theory. The Technical Program Committee of SETA 2004 received 59 submitted - pers, many more than the submissions to p...

Surveys in Combinatorics 2013
  • Language: en
  • Pages: 387

Surveys in Combinatorics 2013

This volume contains nine survey articles based on the invited lectures given at the 24th British Combinatorial Conference, held at Royal Holloway, University of London in July 2013. This biennial conference is a well-established international event, with speakers from around the world. The volume provides an up-to-date overview of current research in several areas of combinatorics, including graph theory, matroid theory and automatic counting, as well as connections to coding theory and Bent functions. Each article is clearly written and assumes little prior knowledge on the part of the reader. The authors are some of the world's foremost researchers in their fields, and here they summarise existing results and give a unique preview of cutting-edge developments. The book provides a valuable survey of the present state of knowledge in combinatorics, and will be useful to researchers and advanced graduate students, primarily in mathematics but also in computer science and statistics.

Information Security and Privacy
  • Language: en
  • Pages: 516

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2003-08-02
  • -
  • Publisher: Springer

The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee...

Wisdom Of Solomon, The: The Genius And Legacy Of Solomon Golomb
  • Language: en
  • Pages: 592

Wisdom Of Solomon, The: The Genius And Legacy Of Solomon Golomb

Solomon Wolf Golomb left an unparalleled legacy of accomplishment and recognition for his work in the applications of mathematics to coding and communication theory. His legacy also includes a host of individuals whose lives and careers were immeasurably enriched by their interactions with him. The co-editors have attempted to collect many articles/essays in this volume, of a not-too-technical sort, by a representative collection of such individuals. Among their motivations is the wish to convince the reader of the incredibly prescient choice of his given name.The first section consists of three articles which have already appeared elsewhere, by noted experts in the fields where the majority...

Boolean Models and Methods in Mathematics, Computer Science, and Engineering
  • Language: en
  • Pages: 781

Boolean Models and Methods in Mathematics, Computer Science, and Engineering

A collection of papers written by prominent experts that examine a variety of advanced topics related to Boolean functions and expressions.