You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Les recherches en cryptographie se sont développées en France ces dernières années du fait de la nécessité de développer la sécurité de tous les échanges informatiques. Toutes les industries ainsi que les administrations sont concernées par ce développement : la sécurité des échanges informatiques ainsi que l’e-administration sont des exemples dans lesquels peut intervenir la cryptographie. Et les fonctions booléennes, en particulier, jouent un rôle central dans le design de la plupart des crypto-systèmes symétriques et leur sécurité. L’ouvrage en anglais, fruit d’un colloque international tenu à Roeun, fait le point sur ces différents systèmes.
It has long been recognized that there are fascinating connections between cod ing theory, cryptology, and combinatorics. Therefore it seemed desirable to us to organize a conference that brings together experts from these three areas for a fruitful exchange of ideas. We decided on a venue in the Huang Shan (Yellow Mountain) region, one of the most scenic areas of China, so as to provide the additional inducement of an attractive location. The conference was planned for June 2003 with the official title Workshop on Coding, Cryptography and Combi natorics (CCC 2003). Those who are familiar with events in East Asia in the first half of 2003 can guess what happened in the end, namely the confer...
This volume covers many topics, including number theory, Boolean functions, combinatorial geometry, and algorithms over finite fields. It contains many new, theoretical and applicable results, as well as surveys that were presented by the top specialists in these areas. New results include an answer to one of Serre's questions, posted in a letter to Top; cryptographic applications of the discrete logarithm problem related to elliptic curves and hyperelliptic curves; construction of function field towers; construction of new classes of Boolean cryptographic functions; and algorithmic applications of algebraic geometry.
These volumes contain the papers presented at the 4th International Conference on Probabilistic Safety Assessment and Management (PSAM 4), held in New York City in September 98. The conference provided a forum for the presentation of innovative methods and applications of risk-based approaches to improve the design and operation of technological systems and processes from the economic and safety points of view. Papers reflect progress made on methods and applications in such areas as modeling and analysis of complex systems, human and organizational performance assessment, software reliability, data collection and analysis, expert judgement modeling and use, identification and assessment of various types of uncertainty, risk-informed regulatory and operational decision making, and public perception of risk. A diverse range of disciplines are represented including aerospace, nuclear, fossil fuels, chemical systems, marine technology, transportation, information technology, medical systems, environment, and defense.
This book constitutes the refereed proceedings of the 9th International Conference on Information Security, ISC 2006, held on Samos Island, Greece in August/September 2006. The 38 revised full papers presented were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections.
This volumecontainstherefereedproceedingsoftheSixth International Conf- ence on Sequences and Their Applications (SETA 2010), held in Paris, France, September 13-17, 2010. The previous ?ve conferences were held in Singapore (RepublicofSingapore),Bergen(Norway),Seoul(SouthKorea),Beijing(China) and Lexington (USA). Topics of SETA include: – Randomness of sequences – Correlation (periodic and aperiodic types) and combinatorial aspects of - quences (di?erence sets) – Sequences with applications in coding theory and cryptography – Sequences over ?nite ?elds/rings/function ?elds – Linear and nonlinear feedback shift register sequences – Sequences for radar distance ranging, synchroniza...
The papers contained in this volume were presented at the third international Workshop on Implementing Automata, held September 17{19,1998, at the U- versity of Rouen, France. Automata theory is the cornerstone of computer science theory. While there is much practical experience with using automata, this work covers diverse - eas,includingparsing,computationallinguistics,speechrecognition,textsear- ing,device controllers,distributed systems, andprotocolanalysis.Consequently, techniques that have been discovered in one area may not be known in another. In addition, there is a growing number of symbolic manipulation environments designed to assist researchers in experimenting with and teaching...
In 1988, for the first time, the two international conferences AAECC-6 and ISSAC'88 (International Symposium on Symbolic and Algebraic Computation, see Lecture Notes in Computer Science 358) have taken place as a Joint Conference in Rome, July 4-8, 1988. The topics of the two conferences are in fact widely related to each other and the Joint Conference presented a good occasion for the two research communities to meet and share scientific experiences and results. The proceedings of the AAECC-6 are included in this volume. The main topics are: Applied Algebra, Theory and Application of Error-Correcting Codes, Cryptography, Complexity, Algebra Based Methods and Applications in Symbolic Computing and Computer Algebra, and Algebraic Methods and Applications for Advanced Information Processing. Twelve invited papers on subjects of common interest for the two conferences are divided between this volume and the succeeding Lecture Notes volume devoted to ISSACC'88. The proceedings of the 5th conference are published as Vol. 356 of the Lecture Notes in Computer Science.
This volume contains the proceedings of the 17th International Conference on Arithmetic, Geometry, Cryptography and Coding Theory (AGC2T-17), held from June 10–14, 2019, at the Centre International de Rencontres Mathématiques in Marseille, France. The conference was dedicated to the memory of Gilles Lachaud, one of the founding fathers of the AGC2T series. Since the first meeting in 1987 the biennial AGC2T meetings have brought together the leading experts on arithmetic and algebraic geometry, and the connections to coding theory, cryptography, and algorithmic complexity. This volume highlights important new developments in the field.
This book constitutes the proceedings of the 26th International Conference on Implementation and Application of Automata, CIAA 2022, held in Rouen, France in June/ July 2022. The 16 regular papers presented together with 3 invited lectures in this book were carefully reviewed and selected from 26 submissions. The topics of the papers covering various fields in the application, implementation, and theory of automata and related structures.