You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book will be published Open Access with a Creative Commons Attribution 4.0 International License (CC BY 4.0). The eBook can be downloaded electronically for free. This volume contains the proceedings of the LuCaNT (LMFDB, Computation, and Number Theory) conference held from July 10–14, 2023, at the Institute for Computational and Experimental Research in Mathematics (ICERM), Providence, Rhode Island and affiliated with Brown University. This conference provided an opportunity for researchers, scholars, and practitioners to exchange ideas, share advances, and collaborate in the fields of computation, mathematical databases, number theory, and arithmetic geometry. The papers that appear in this volume record recent advances in these areas, with special focus on the LMFDB (the L-Functions and Modular Forms Database), an online resource for mathematical objects arising in the Langlands program and the connections between them.
In the mid-1970s, Whitfield Diffie and Martin Hellman invented public key cryptography, an innovation that ultimately changed the world. Today public key cryptography provides the primary basis for secure communication over the internet, enabling online work, socializing, shopping, government services, and much more. While other books have documented the development of public key cryptography, this is the first to provide a comprehensive insiders’ perspective on the full impacts of public key cryptography, including six original chapters by nine distinguished scholars. The book begins with an original joint biography of the lives and careers of Diffie and Hellman, highlighting parallels an...
This book presents refereed proceedings of the First International Conference on Algebra, Codes and Cryptology, A2C 2019, held in Dakar, Senegal, in December 2019. The 14 full papers were carefully reviewed and selected from 35 submissions. The papers are organized in topical sections on non-associative and non-commutative algebra; code, cryptology and information security.
This book constitutes the thoroughly refereed post-proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography, SAC 2000, held in Waterloo, Ontario, Canada, in August 2000. The 24 revised full papers presented were selected from 41 submissions and have gone through two rounds of reviewing and revision. The papers are organized in topical sections on cryptanalysis, block ciphers: new designs, elliptic curves and efficient implementations, security protocols and applications, block ciphers and hash functions, Boolean functions and stream ciphers, and public key systems.
This book constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held in Nancy, France, in July 2010. The 25 revised full papers presented together with 5 invited papers were carefully reviewed and selected for inclusion in the book. The papers are devoted to algorithmic aspects of number theory, including elementary number theory, algebraic number theory, analytic number theory, geometry of numbers, algebraic geometry, finite fields, and cryptography.
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things