## Home > Tags: cryptography (Total 285 Records)

### Selected Areas in Cryptography SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Lecture Notes in Computer Science)

Cryptography By:Tanja Lange 2014-05-21 00:00:00

This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections nam 20th international conference, cryptography sac, crypto block ciphers, lecture notes, selected papers

Tags:
*computer*
*cryptography*
*area*
*lecture*
*science*
*conference*
*papers*
*burnaby*
*sac*

### Error-correcting Codes, Finite Geometries and Cryptography (Contemporary Mathematics)

Cryptography By:Aiden A. Bruen 2010-09-03 00:00:00

The volume features cutting-edge theoretical results on the Reed-Muller and Reed-Solomon codes, classical linear codes, codes from nets and block designs, LDPC codes, perfect quantum and orthogonal codes, iterative decoding, magnetic storage and digital memory devices, and MIMO channels. There are n finite geometries, finite geometries concerns, cutting-edge theoretical results, classical linear codes, affine planes.error-correcting codes

Tags:
*cryptography*
*mathematics*
*codes*
*contemporary*
*finite*
*geometries*

### Introduction To Cryptography With Java Applets (Jones & Bartlett Learning)

Cryptography By:David Bishop 2002-12-26 00:00:00

Introduction to Cryptography with Java Applets covers the mathematical basis of cryptography and cryptanalysis, like linear diophantine equations, linear congruences, systems of linear congruences, quadratic congruences, and exponential congruences. The chapters present theorems and proofs, and many java applets, linear congruences, linear diophantine equations, bartlett learning, pseudo-random bit generation

### The LLL Algorithm: Survey and Applications (Information Security and Cryptography)

Algorithms By:Phong Q. Nguyen, Brigitte Vallee 2009-12-02 00:00:00

Computational aspects of geometry of numbers have been revolutionized by the LenstraLenstraLovasz lattice reduction algorithm (LLL), which has led to bre- throughs in elds as diverse as computer algebra, cryptology, and algorithmic number theory. After its publication in 1982, LLL was immediately r lll algorithm, algorithmic number theory, lll birthday conference, lattice reduction algorithm, important algorithmic achievements

Tags:
*security*
*application*
*information*
*algorithm*
*cryptography*
*survey*
*lll*

### Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

Cryptography By:Tal Malkin and Vladimir Kolesnikov 2016-01-09 00:00:00

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were care 13th international conference, network security, new york, applied cryptography, primitives secure computation

Tags:
*computer*
*network*
*security*
*cryptography*
*lecture*
*science*
*conference*
*papers*
*york*
*acns*

### Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, ... Papers (Lecture Notes in Computer Science)

Cryptography By:Enes Pasalic and Lars R. Knudsen 2016-02-16 00:00:00

This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions international conference, information security, key cryptography cryptanalysis, lecture notes, slovenia

Tags:
*computer*
*security*
*information*
*cryptography*
*lecture*
*science*
*conference*
*papers*
*slovenia*
*balkans*
*balkancryptsec*
*koper*

### Lightweight Cryptography for Security and Privacy: 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers (Lecture Notes in Computer Science) [Germa

Cryptography By:Tim Guneysu and Gregor Leander 2016-03-01 00:00:00

This book constitutes the refereed post-conference proceedings of the 4th International Workshop on Lightweight Cryptography for Security and Privacy, LightSec 2015, held in Bochum, Germany, in September 2015. The 9 full papers presented were carefully reviewed and selected from 17 submissions. The international workshop, refereed post-conference proceedings, lightweight cryptography, implementation challenges.lightweight cryptography, lecture notes

Tags:
*computer*
*security*
*cryptography*
*lecture*
*science*
*lightweight*
*privacy*
*papers*
*lightsec*
*bochum*
*germa*

### The Hash Function BLAKE (Information Security and Cryptography)

Cryptography By:Jean-Philippe Aumasson 2014-12-20 00:00:00

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on impl hash function blake, cryptographic hashing, blake’s properties, cryptographic hash function, nist sha3 competition

### Cryptography for Internet and Database Applications: Developing Secret and Public Key Techniques with Java

Networking By:Nick Galbreath 2002-09-23 00:00:00

Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, public key techniques, database applications, biggest public network, unreadable format, gold standard

Tags:
*java*
*database*
*secret*
*application*
*technique*
*internet*
*cryptography*
*developing*
*key*

### Access Control, Security, and Trust: A Logical Approach (Chapman & Hall/CRC Cryptography and Network Security Series)

Security By:Shiu-Kai Chin 2010-07-26 00:00:00

Developed from the authors courses at Syracuse University and the U.S. Air Force Research Laboratory, Access Control, Security, and Trust: A Logical Approach equips readers with an access control logic they can use to specify and verify their security designs. Throughout the text, the authors use a access control, access control logic, network security series, hall/crc cryptography, single access control

Tags:
*network*
*security*
*series*
*cryptography*
*access*
*control*
*approach*
*logical*
*chapman*