# The Leading eBooks Store Online

## 3,603,993 members ⚫ 1,165,375 ebooks

#### Public-Key Cryptography ? PKC 2016

Springer Berlin Heidelberg 2016; US$ 94.00Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections named:... more...

#### Public-Key Cryptography ? PKC 2016

Springer Berlin Heidelberg 2016; US$ 169.00Thetwo-volume set LNCS 9614 and 9615 constitutes the refereed proceedings of the 19thIACR International Conference on the Practiceand Theory in Public-Key Cryptography, PKC 2016, held in Taipei, Taiwan, in March2016. The34 revised papers presented were carefully reviewed and selected from 143submissions. They are organized in topical sections... more...

#### Topics in Cryptology - CT-RSA 2016

Springer International Publishing 2016; US$ 94.00Thisbook constitutes the refereed proceedings of the Cryptographer's Track at theRSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March2016. The26 papers presented in this volume were carefully reviewed and selected from 76submissions. The focus of the track is on following subjects: secure keyexchange schemes, authenticated... more...

#### Quantum Computational Number Theory

Springer International Publishing 2015; US$ 109.00This book provides a comprehensive introduction to advanced topics in the computational and algorithmic aspects of number theory, focusing on applications in cryptography. Readers will learn to develop fast algorithms, including quantum algorithms, to solve various classic and modern number theoretic problems. Key problems include prime number generation,... more...

#### Visual Cryptography for Image Processing and Security

Springer International Publishing 2015; US$ 89.99This unique text/reference addresses the fundamental concepts in the theory and practice of visual cryptography, a secret sharing technique which allows the encryption of an image without requiring any complex computation or knowledge of cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed... more...

#### Computation, Cryptography, and Network Security

Springer International Publishing 2015; US$ 189.00Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories... more...

#### Why Cryptography Should Not Rely on Physical Attack Complexity

Springer Singapore 2015; US$ 99.00This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years... more...

#### Progress in Cryptology -- LATINCRYPT 2015

Springer International Publishing 2015; US$ 84.00This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols;... more...

#### Coding Theory and Applications

Springer International Publishing 2015; US$ 169.00The topics covered in this book, written by researchers at the forefront of their field, represent some of the most relevant research areas in modern coding theory: codes and combinatorial structures, algebraic geometric codes, group codes, quantum codes, convolutional codes, network coding and cryptography. The book includes a survey paper on the... more...

#### A Course in Mathematical Cryptography

De Gruyter 2015; US$ 70.00The subject of this book is mathematical cryptography. By this we mean the mathematics involved in cryptographic protocols. As the field has expanded, using both commutative and noncommutative algebraic objects as cryptographic platforms, a book describing and explaining all these mathematical methods is of immeasurable value. more...