This book constitutes the refereed proceedings of the 18th International Conference on Practice and theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The 36 papers presen...
详细信息
ISBN:
(数字)9783662464472
ISBN:
(纸本)9783662464465
This book constitutes the refereed proceedings of the 18th International Conference on Practice and theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015.
The 36 papers presented in this volume were carefully reviewed and selected from 118 submissions. They are organized in topical sections named: public-key encryption; e-cash; cryptanalysis; digital signatures; password-based authentication; pairint-based cryptography; efficient constructions; cryptography with imperfect keys; interactive proofs; lattice-based cryptography; and identity-based, predicate, and functional encryption.
This book constitutes the refereed proceedings of the 5th International Symposium on Advances in Signal Processing and Intelligent Recognition Systems, SIRS 2019, held in Trivandrum, India, in December 2019.
ISBN:
(数字)9789811548284
ISBN:
(纸本)9789811548277
This book constitutes the refereed proceedings of the 5th International Symposium on Advances in Signal Processing and Intelligent Recognition Systems, SIRS 2019, held in Trivandrum, India, in December 2019.
The papers contained in this volume were presented at theFourth Annual Symposium on Combinatorial Pattern Matching,held in Padova, Italy, in June 1993.Combinatorial pattern matching addresses issues of searchingan...
详细信息
ISBN:
(数字)9783540477327
ISBN:
(纸本)9783540567646
The papers contained in this volume were presented at the
Fourth Annual Symposium on Combinatorial Pattern Matching,
held in Padova, Italy, in June 1993.
Combinatorial pattern matching addresses issues of searching
and matching of strings and more complicated patterns such
as trees, regular expressions, extended expressions, etc.
The goal is to derive nontrivial combinatorial properties
for such structures and then to exploit these properties in
order to achieve superior performance for the corresponding
computational problems. In recent years, a steady flow of
high-quality scientific studies of this subject has changed
a sparse set of isolated results into a full-fledged area of
algorithmics.
The area is expected to grow even further due to the
increasing demand for speedand efficiency that comes
especially from molecular biology and the Genome project,
but also from other diverse areas such as information
retrieval, pattern recognition, compilers, data compression,
and program analysis.
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, fro...
详细信息
ISBN:
(数字)9783031327070
ISBN:
(纸本)9783031327063;9783031327094
This proceedings volume presents a selection of peer-reviewed contributions from the Second Non-Associative Algebras and Related Topics (NAART II) conference, which was held at the University of Coimbra, Portugal, from July 18–22, 2022. The conference was held in honor of mathematician Alberto Elduque, who has made significant contributions to the study of non-associative structures such as Lie, Jordan, and Leibniz algebras.;The papers in this volume are organized into four parts: Lie algebras, superalgebras, and groups; Leibniz algebras; associative and Jordan algebras; and other non-associative structures. They cover a variety of topics, including classification problems, special maps (automorphisms, derivations, etc.), constructions that relate different structures, and representation theory.;One of the unique features of NAART is that it is open to all topics related to non-associative algebras, including octonion algebras, composite algebras, Banach algebras, connections with geometry, applications in codingtheory, combinatorial problems, and more. This diversity allows researchers from a range of fields to find the conference subjects interesting and discover connections with their own areas, even if they are not traditionally considered non-associative algebraists.;Since its inception in 2011, NAART has been committed to fostering cross-disciplinary connections in the study of non-associative structures.
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented...
详细信息
ISBN:
(数字)9783642239519
ISBN:
(纸本)9783642239502
This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011.
The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.
The fascinating theory of error-correcting codes is a rather new addition to the list of mathematical disciplines. It grew out of the need to communicate information electronically, and is currently no more than 60 ye...
详细信息
ISBN:
(数字)9783540317036
ISBN:
(纸本)9783540283713;9783642421815
The fascinating theory of error-correcting codes is a rather new addition to the list of mathematical disciplines. It grew out of the need to communicate information electronically, and is currently no more than 60 years old. - ing an applied discipline by de?nition, a surprisingly large number of pure mathematical areas tie into codingtheory. If one were to name just the most important connections, one would start of course with Linear Algebra, then list Algebra and Combinatorics, and further mention Number theory and - ometry as well as Algebraic Geometry. Being a thorough introduction to the ?eld, this book starts from the very beginning, which is the channel model of communication in the presence of noise. From there, we develop the fundamental concepts of error-correcting codes, like the Hamming metric and the maximum likelihood decoding pr- ciple. After discussing dual codes and simple decoding procedures, this book takes an unusual turn. The standard approach would be to move on from there and introduce either more theory or present standard constructions of codes. The approach taken here is different.
暂无评论