You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The aim of the Expositions is to present new and important developments in pure and applied mathematics. Well established in the community over more than two decades, the series offers a large library of mathematical works, including several important classics. The volumes supply thorough and detailed expositions of the methods and ideas essential to the topics in question. In addition, they convey their relationships to other parts of mathematics. The series is addressed to advanced readers interested in a thorough study of the subject. Editorial Board Lev Birbrair, Universidade Federal do Cear , Fortaleza, Brasil Walter D. Neumann, Columbia University, New York, USA Markus J. Pflaum, Unive...
This book contains the proceedings of the NATO-Russia Advanced Study Institute (ASI) 'Boolean Functions in Cryptology and Information Security', which was held at September 8-18, 2007 in Zvenigorod, Moscow region, Russia. These proceedings consist of three parts. The first part contains survey lectures on various areas of Boolean function theory that are of primary importance for cryptology. These lectures were delivered by leading researchers from many countries and contain both classic and recent results. The second part contains research papers written by graduate and postgraduate students of Lomonosov University, Moscow. The third part contains a list of open problems in Boolean function theory. The book includes lectures and papers concern the following areas: Cryptographic properties of Boolean functions and mappings; Algebraic and combinatorial constructions of Boolean functions and mappings with prescribed cryptographic properties; Boolean functions and mappings in cryptosynthesis; Classification of Boolean functions; Cryptanalysis of ciphers; Efficient computations in finite fields.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.
This book constitutes the refereed proceedings of the 7th International Conference on Sequences and Their Applications, SETA 2012, held in Waterloo, Canada, in June 2012. The 28 full papers presented together with 2 invited papers in this volume were carefully reviewed and selected from 48 submissions. The papers are grouped in topical sections on perfect sequences; finite fields; boolean functions; Golomb 80th birthday session; linear complexity; frequency hopping; correlation of sequences; bounds on sequences, cryptography; aperiodic correlation; and Walsh transform.
This book provides a broad, interdisciplinary overview of non-Archimedean analysis and its applications. Featuring new techniques developed by leading experts in the field, it highlights the relevance and depth of this important area of mathematics, in particular its expanding reach into the physical, biological, social, and computational sciences as well as engineering and technology. In the last forty years the connections between non-Archimedean mathematics and disciplines such as physics, biology, economics and engineering, have received considerable attention. Ultrametric spaces appear naturally in models where hierarchy plays a central role – a phenomenon known as ultrametricity. In ...
NTAMCS '93 brought to Moscow researchers from areas of computer science and mathematics that traditionally have been apart, but which use similar number theoretic and algebraic methods. An incomplete list of such areas includes cryptography, coding theory, computational algebra and number theory, and numerical analysis. The papers in this volume emphasise the common principles and the essential unity of the computational and mathematical sciences.
The 4th China International Conference on Information Security and Crypt- ogy(Inscrypt2008)wasco-organizedbytheChineseAssociationforCryptologic Research and by the State Key Laboratory of Information Security. The conf- ence was held in Beijing, China in mid-December, and was further sponsored by the Institute of Software, the Graduate University of the Chinese Academy of Sciences, and the National Natural Science Foundations of China. Givenitsfour-yearsuccess,Inscryptis nowatradition.It is,infact,aleading annual international event in the area of cryptographyand information security, taking place in China. We are pleased to report the continuous support of the entire community: authors, att...
None