Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Untold Story of Sabina Spielrein
  • Language: en

The Untold Story of Sabina Spielrein

  • Type: Book
  • -
  • Published: 2023-02-22
  • -
  • Publisher: Unknown

The unpublished Russian diary and letters of Sabina Spielrein represent a milestone for academics, scholars, historians, and psychoanalysts whose interest in the most enigmatic woman to have pioneered psychoanalysis and developmental psychology in the first part of the 20th century has never ceased to grow after she was rediscovered in the mid-1980s. These primary sources, which include unreleased drawings and notes, were patiently exhumed by Lothane in Switzerland and translated with the collaboration of Spielrein's grandnephew, Vladimir Shpilrain. Thoroughly presented and commented on by Lothane, this book will also fascinate a public increasingly drawn to the legacy of a feminist figure whose intimate correspondence provides an invaluable testimony from her childhood to the most ignored episodes of an extraordinary life between passions, strokes of genius, and tragedies. A life prematurely engulfed in times of atrocities, when Sabina Spielrein was last seen with her daughters, in 1942, in a column of 27,000 Jews marched by the Nazis to be murdered in Zmiyevskaia ravine, Rostov's Babi Yar.

Group-based Cryptography
  • Language: en
  • Pages: 192

Group-based Cryptography

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown that there is a remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. Then, complexity theory, notably generic-case complexity of algorithms, is employed for cryptanalysis of various cryptographic protocols based on infinite groups, and the ideas and machinery from the theory of generic-case complexity are used to study asymptotically dominant properties of some infinite groups that have been applied in public key cryptography so far. Its elementary exposition makes the book accessible to graduate as well as undergraduate students in mathematics or computer science.

Information Security and Cryptology – ICISC 2006
  • Language: en
  • Pages: 369

Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ICISC 2006, held in Busan, Korea in November/December 2006. The 26 revised full papers presented together with two invited talks have gone through two rounds of reviewing and improvement and were selected from 129 submissions. The papers are organized in topical sections on hash functions, block and stream ciphers, efficient implementation and hardware, network security and access control, mobile communications security, forensics, copyright protection, biometrics, public key cryptosystems, and digital signatures.

Affine Algebraic Geometry
  • Language: en
  • Pages: 288

Affine Algebraic Geometry

A Special Session on affine and algebraic geometry took place at the first joint meeting between the American Mathematical Society (AMS) and the Real Sociedad Matematica Espanola (RSME) held in Seville (Spain). This volume contains articles by participating speakers at the Session. The book contains research and survey papers discussing recent progress on the Jacobian Conjecture and affine algebraic geometry and includes a large collection of open problems. It is suitable for graduate students and research mathematicians interested in algebraic geometry.

Combinatorial Methods
  • Language: en
  • Pages: 322

Combinatorial Methods

The main purpose of this book is to show how ideas from combinatorial group theory have spread to two other areas of mathematics: the theory of Lie algebras and affine algebraic geometry. Some of these ideas, in turn, came to combinatorial group theory from low-dimensional topology in the beginning of the 20th Century.

Progress in Cryptology - VIETCRYPT 2006
  • Language: en
  • Pages: 395

Progress in Cryptology - VIETCRYPT 2006

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.

Algebraic Methods in Cryptography
  • Language: en
  • Pages: 190

Algebraic Methods in Cryptography

The book consists of contributions related mostly to public-key cryptography, including the design of new cryptographic primitives as well as cryptanalysis of previously suggested schemes. Most papers are original research papers in the area that can be loosely defined as ``non-commutative cryptography''; this means that groups (or other algebraic structures) which are used as platforms are non-commutative.

Computational and Statistical Group Theory
  • Language: en
  • Pages: 138

Computational and Statistical Group Theory

This book gives a nice overview of the diversity of current trends in computational and statistical group theory. It presents the latest research and a number of specific topics, such as growth, black box groups, measures on groups, product replacement algorithms, quantum automata, and more. It includes contributions by speakers at AMS Special Sessions at The University of Nevada (Las Vegas) and the Stevens Institute of Technology (Hoboken, NJ). It is suitable for graduate students and research mathematicians interested in group theory.

Algorithmic Problems of Group Theory, Their Complexity, and Applications to Cryptography
  • Language: en
  • Pages: 136

Algorithmic Problems of Group Theory, Their Complexity, and Applications to Cryptography

This volume contains the proceedings of the AMS Special Session on Algorithmic Problems of Group Theory and Their Complexity, held January 9-10, 2013 in San Diego, CA and the AMS Special Session on Algorithmic Problems of Group Theory and Applications to Information Security, held April 6-7, 2013 at Boston College, Chestnut Hill, MA. Over the past few years the field of group-based cryptography has attracted attention from both group theorists and cryptographers. The new techniques inspired by algorithmic problems in non-commutative group theory and their complexity have offered promising ideas for developing new cryptographic protocols. The papers in this volume cover algorithmic group theory and applications to cryptography.