Kryptografie hat sich in jüngster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden können. Das Buch stellt die gesamte Kryptografie unter diesem Aspe...
详细信息
ISBN:
(数字)9783834896315
ISBN:
(纸本)9783834809773
Kryptografie hat sich in jüngster Zeit als eine Wissenschaft gezeigt, bei der mathematische Methoden mit besonderem Erfolg eingesetzt werden können. Das Buch stellt die gesamte Kryptografie unter diesem Aspekt vor: Grundlagen und Anwendungen, Verschlüsselung und Authentifikation, symmetrische Algorithmen und Public-Key-Verfahren werden entsprechend ihrer Wichtigkeit präsentiert. Das Buch hat den Umfang einer 2-semestrigen Vorlesung, aufgrund seiner klaren Darstellung eignet es sich aber auch hervorragend zum Selbststudium. Zahlreiche Übungsaufgaben von unterschiedlichem Schwierigkeitsgrad dienen zur Kontrolle des Verständnisses.
This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and information Security, ASCIS 2022, held in Rajkot, India, in November 2022.;The 37 full ...
详细信息
ISBN:
(数字)9783031230950
ISBN:
(纸本)9783031230943
This two-volume constitutes the refereed proceedings of the First International Conference on Advancements in Smart Computing and information Security, ASCIS 2022, held in Rajkot, India, in November 2022.;The 37 full papers and 19 short papers presented were thoroughly reviewed and selected from the 206 submissions. The papers are organized in topical sections on artificial intelligence; smart computing; cyber security; industry.
This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009. The 38 revised full papers presented were carefully re...
详细信息
ISBN:
(数字)9783642033568
ISBN:
(纸本)9783642033551
This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009. The 38 revised full papers presented were carefully reviewed and selected from 213 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on key leakage, hash-function cryptanalysis, privacy and anonymity, interactive proofs and zero-knowledge, block-cipher cryptanalysis, modes of operation, elliptic curves, cryptographic hardness, merkle puzzles, cryptography in the physical world, attacks on signature schemes, secret sharing and secure computation, cryptography and game-theory, cryptography and lattices, identity-based encryption and cryptographers’ toolbox.
This book constitutes the refereed proceedings of the 15th International Joint Conference on E-Business and Telecommunications, ICETE 2018, held in Porto, Portugal, in July 2018.;ICETE is a joint international confere...
详细信息
ISBN:
(数字)9783030348663
ISBN:
(纸本)9783030348656
This book constitutes the refereed proceedings of the 15th International Joint Conference on E-Business and Telecommunications, ICETE 2018, held in Porto, Portugal, in July 2018.;ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless information Systems, WINSYS. The 11 full papers presented in the volume were carefully reviewed and selected from the 201 submissions. The papers cover the following key areas of information and communication technologies: data communication networking, e-business, optical communication systems, security andcryptography, signal processing and multimedia applications, and wireless networks and mobile systems.
This book constitutes the refereed proceedings of the 7th International Conference on the theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26...
详细信息
ISBN:
(数字)9783319067346
ISBN:
(纸本)9783319067339
This book constitutes the refereed proceedings of the 7th International Conference on the theory and Application of Cryptographic Techniques in Africa, AFRICA CRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africa crypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number theory, Hardware Implementation, Protocols and Lattice-based Cryptography.
This volume contains the papers presented at the 13th International Symposium on String Processing and information Retrieval (SPIRE), held October 11-13, 2006, in Glasgow, Scotland. The SPIRE annual symposium provides...
详细信息
ISBN:
(数字)9783540457756
ISBN:
(纸本)9783540457749
This volume contains the papers presented at the 13th International Symposium on String Processing and information Retrieval (SPIRE), held October 11-13, 2006, in Glasgow, Scotland. The SPIRE annual symposium provides an opportunity for both new and established researchers to present original contributions to areas such as string processing (dictionary algorithms, text searching, pattern matching, text c- pression, text mining, natural language processing, and automata-based string processing); information retrieval languages, applications, and evaluation (IR modelling, indexing, ranking and ?ltering, interface design, visualization, cro- lingual IR systems, multimedia IR, digital libraries, collaborative retrieval, W- related applications, XML, information retrieval from semi-structured data, text mining, and generation of structured data from text); and interaction of biology and computation (sequencing and applications in molecular biology, evolution and phylogenetics, recognition of genes and regulatory elements, and sequen- driven protein structure prediction). The papers in this volume were selected from 102 papers submitted from over 20 di?erent countries in response to the Call for Papers. A total of 26 submissions were accepted as full papers, yielding an acceptance rate of about 25%. In view of the large number of good-quality submissions the Program Committee decided to accept 5 short papers, that have also been included in the proceedings. SPIRE 2006 also featured two talks by invited speakers: Jamie Callan (Carnegie Mellon University, USA) and Martin Farach-Colton (Rutgers University, USA).
暂无评论