Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Women in Numbers Europe III
  • Language: en
  • Pages: 334

Women in Numbers Europe III

This volume includes articles spanning several research areas in number theory, such as arithmetic geometry, algebraic number theory, analytic number theory, and applications in cryptography and coding theory. Most of the articles are the results of collaborations started at the 3rd edition of the Women in Numbers Europe (WINE) conference between senior and mid-level faculty, junior faculty, postdocs, and graduate students. The contents of this book should be of interest to graduate students and researchers in number theory.

New Frontiers in Number Theory and Applications
  • Language: en
  • Pages: 457

New Frontiers in Number Theory and Applications

None

Progress in Cryptology - AFRICACRYPT 2020
  • Language: en
  • Pages: 449

Progress in Cryptology - AFRICACRYPT 2020

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2020, held in Cairo, Egypt, in July 2020. The 21 papers presented in this book were carefully reviewed and selected from 49 submissions. The papers are organized in topical sections on zero knowledge, symmetric key cryptography, elliptic curves, post quantum cryptography, lattice based cryptography, side channel attacks, cryptanalysis and new algorithms and schemes. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).

Principles and Practice of Constraint Programming
  • Language: en
  • Pages: 984

Principles and Practice of Constraint Programming

This book constitutes the proceedings of the 26th International Conference on Principles and Practice of Constraint Programming, CP 2020, held in Louvain-la-Neuve, Belgium, in September 2020. The conference was held virtually due to the COVID-19 pandemic. The 55 full papers presented in this volume were carefully reviewed and selected from 122 submissions. They deal with all aspects of computing with constraints including theory, algorithms, environments, languages, models, systems, and applications such as decision making, resource allocation, scheduling, configuration, and planning. The papers were organized according to the following topics/tracks: technical track; application track; and CP and data science and machine learning.

Theory and Applications of Satisfiability Testing – SAT 2021
  • Language: en
  • Pages: 564

Theory and Applications of Satisfiability Testing – SAT 2021

This book constitutes the proceedings of the 24th International Conference on Theory and Applications of Satisfiability Testing, SAT 2021, which took place in Barcelona, Spain, in July 2021. The 37 full papers presented in this volume were carefully reviewed and selected from 73 submissions. They deal with theory and applications of the propositional satisfiability problem, broadly construed. Aside from plain propositional satisfiability, the scope of the meeting includes Boolean optimization, including MaxSAT and pseudo-Boolean (PB) constraints, quantified Boolean formulas (QBF), satisfiability modulo theories (SMT), and constraint programming (CP) for problems with clear connections to Boolean reasoning.

Progress in Cryptology - INDOCRYPT 2008
  • Language: en
  • Pages: 449

Progress in Cryptology - INDOCRYPT 2008

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.

Algorithmic Number Theory
  • Language: en
  • Pages: 407

Algorithmic Number Theory

This book constitutes the refereed proceedings of the 9th International Algorithmic Number Theory Symposium, ANTS 2010, held in Nancy, France, in July 2010. The 25 revised full papers presented together with 5 invited papers were carefully reviewed and selected for inclusion in the book. The papers are devoted to algorithmic aspects of number theory, including elementary number theory, algebraic number theory, analytic number theory, geometry of numbers, algebraic geometry, finite fields, and cryptography.

Progress in Cryptology – INDOCRYPT 2022
  • Language: en
  • Pages: 725

Progress in Cryptology – INDOCRYPT 2022

The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography

Progress in Cryptology -- AFRICACRYPT 2011
  • Language: en
  • Pages: 397

Progress in Cryptology -- AFRICACRYPT 2011

This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.

Advances in Cryptology - ASIACRYPT 2013
  • Language: en
  • Pages: 567

Advances in Cryptology - ASIACRYPT 2013

  • Type: Book
  • -
  • Published: 2013-11-23
  • -
  • Publisher: Springer

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.