You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains a collection of papers on algebraic curves and their applications. While algebraic curves traditionally have provided a path toward modern algebraic geometry, they also provide many applications in number theory, computer security and cryptography, coding theory, differential equations, and more. Papers cover topics such as the rational torsion points of elliptic curves, arithmetic statistics in the moduli space of curves, combinatorial descriptions of semistable hyperelliptic curves over local fields, heights on weighted projective spaces, automorphism groups of curves, hyperelliptic curves, dessins d'enfants, applications to Painlevé equations, descent on real algebraic varieties, quadratic residue codes based on hyperelliptic curves, and Abelian varieties and cryptography. This book will be a valuable resource for people interested in algebraic curves and their connections to other branches of mathematics.
Best known as the author of the Decameron, Giovanni Boccaccio is a key figure in Italian literature. In the mid-fourteenth century, however, Boccaccio was also deeply involved in the politics of Florence and the extent of his involvement steered and inspired his work as a writer. Boccaccio’s Florence explores the financial, political, and social turbulence of Florence at this time, as well as the major players in literary and political circles, to understand the complex ways they emerged in Boccaccio’s writing. Based on extensive archival research and close reading of Boccaccio’s works, the book aims to recover the dynamics of the Florentine conspiracy of 1360 and how this event affected Boccaccio’s writing, arguing that his works reveal clear references to this episode when read in light of the reconstructed historical context. In this rich and textured picture of the man in his time, Elsa Filosa documents a microhistory of connections and interconnections and offers new, more political and historically imbedded readings of Boccaccio’s seminal works.
This book will be published Open Access with a Creative Commons Attribution 4.0 International License (CC BY 4.0). The eBook can be downloaded electronically for free. This volume contains the proceedings of the LuCaNT (LMFDB, Computation, and Number Theory) conference held from July 10–14, 2023, at the Institute for Computational and Experimental Research in Mathematics (ICERM), Providence, Rhode Island and affiliated with Brown University. This conference provided an opportunity for researchers, scholars, and practitioners to exchange ideas, share advances, and collaborate in the fields of computation, mathematical databases, number theory, and arithmetic geometry. The papers that appear in this volume record recent advances in these areas, with special focus on the LMFDB (the L-Functions and Modular Forms Database), an online resource for mathematical objects arising in the Langlands program and the connections between them.
This two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, held in Rome, Italy, in October 2020. The conference was held virtually due to the COVID-19 pandemic. The 46 revised full papers presented were carefully reviewed and selected from 214 submissions. The papers were organized in topical sections named: cryptographic protocols cryptographic primitives, attacks on cryptographic primitives, encryption and signature, blockchain and cryptocurrency, secure multi-party computation, post-quantum cryptography.
The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023. The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
The eight-volume set LNCS 14438 until 14445 constitutes the proceedings of the 29th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2023, held in Guangzhou, China, during December 4-8, 2023. The total of 106 full papers presented in these proceedings was carefully reviewed and selected from 375 submissions. The papers were organized in topical sections as follows: Part I: Secure Multi-party computation; threshold cryptography; . Part II: proof systems - succinctness and foundations; anonymity; Part III: quantum cryptanalysis; symmetric-key cryptanalysis; Part IV: cryptanalysis of post-quantum and public-key systems; side-channels; quantum random oracle model; Part V: functional encryption, commitments and proofs; secure messaging and broadcast; Part VI: homomorphic encryption; encryption with special functionalities; security proofs and security models; Part VII: post-quantum cryptography; Part VIII: quantum cryptography; key exchange; symmetric-key design.
Eight articles provide a valuable survey of the present state of knowledge in combinatorics.
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2019, held in Rabat, Morocco, in July 2019. The 22 papers presented in this book were carefully reviewed and selected from 53 submissions. The papers are organized in topical sections on protocols; post-quantum cryptography; zero-knowledge; lattice based cryptography; new schemes and analysis; block ciphers; side-channel attacks and countermeasures; signatures. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).