Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes
Title Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF eBook
Author B. Preneel
Publisher IOS Press
Pages 284
Release 2009-05-27
Genre Computers
ISBN 160750426X

Download Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes Book in PDF, Epub and Kindle

The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008 by the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences in cooperation with COSIC, KU Leuven and in the framework of the NATO Science for Peace and Security program. Goal of the organizers was to gather international experts from both fields - coding theory and cryptography - in order to exchange ideas, define new challenges and open problems for future research. These proceedings present the state-of-the-art in the current research on cryptography applying techniques and results from coding theory. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes is divided into two parts. In the first part the papers based on the lectures of the invited speakers, and in the second part the papers based on the talks of the participants in the workshop are included.

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes
Title Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF eBook
Author Bart Preneel
Publisher IOS Press
Pages 284
Release 2009
Genre Computers
ISBN 1607500027

Download Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes Book in PDF, Epub and Kindle

The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008. This title includes the papers based on the lectures of the invited speakers, and on the talks of the participants in the workshop.

Boolean Functions for Cryptography and Coding Theory

Boolean Functions for Cryptography and Coding Theory
Title Boolean Functions for Cryptography and Coding Theory PDF eBook
Author Claude Carlet
Publisher Cambridge University Press
Pages 577
Release 2021-01-07
Genre Computers
ISBN 1108473806

Download Boolean Functions for Cryptography and Coding Theory Book in PDF, Epub and Kindle

A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.

Mathematical Aspects of Computer and Information Sciences

Mathematical Aspects of Computer and Information Sciences
Title Mathematical Aspects of Computer and Information Sciences PDF eBook
Author Daniel Slamanig
Publisher Springer Nature
Pages 469
Release 2020-03-18
Genre Computers
ISBN 3030431207

Download Mathematical Aspects of Computer and Information Sciences Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 8th International Conference on Mathematical Aspects of Computer and Information Sciences, MACIS 2019, held in Gebze, Turkey, in November 2019. The 22 revised papers and 14 short papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in the following topical sections: algorithms and foundation; security and cryptography; combinatorics, codes, designs and graphs; data modeling and machine learning; tools and software track.

Finite Fields and Their Applications

Finite Fields and Their Applications
Title Finite Fields and Their Applications PDF eBook
Author Pascale Charpin
Publisher Walter de Gruyter
Pages 288
Release 2013-05-28
Genre Mathematics
ISBN 3110283603

Download Finite Fields and Their Applications Book in PDF, Epub and Kindle

This book is based on the invited talks of the "RICAM-Workshop on Finite Fields and Their Applications: Character Sums and Polynomials" held at the Federal Institute for Adult Education (BIfEB) in Strobl, Austria, from September 2-7, 2012. Finite fields play important roles in many application areas such as coding theory, cryptography, Monte Carlo and quasi-Monte Carlo methods, pseudorandom number generation, quantum computing, and wireless communication. In this book we will focus on sequences, character sums, and polynomials over finite fields in view of the above mentioned application areas: Chapters 1 and 2 deal with sequences mainly constructed via characters and analyzed using bounds on character sums. Chapters 3, 5, and 6 deal with polynomials over finite fields. Chapters 4 and 9 consider problems related to coding theory studied via finite geometry and additive combinatorics, respectively. Chapter 7 deals with quasirandom points in view of applications to numerical integration using quasi-Monte Carlo methods and simulation. Chapter 8 studies aspects of iterations of rational functions from which pseudorandom numbers for Monte Carlo methods can be derived. The goal of this book is giving an overview of several recent research directions as well as stimulating research in sequences and polynomials under the unified framework of character theory.

Security of Ubiquitous Computing Systems

Security of Ubiquitous Computing Systems
Title Security of Ubiquitous Computing Systems PDF eBook
Author Gildas Avoine
Publisher Springer Nature
Pages 268
Release 2021-01-14
Genre Computers
ISBN 3030105911

Download Security of Ubiquitous Computing Systems Book in PDF, Epub and Kindle

The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.

Advances in Cryptology -- ASIACRYPT 2012

Advances in Cryptology -- ASIACRYPT 2012
Title Advances in Cryptology -- ASIACRYPT 2012 PDF eBook
Author Xiaoyun Wang
Publisher Springer Science & Business Media
Pages 791
Release 2012-11-19
Genre Computers
ISBN 3642349617

Download Advances in Cryptology -- ASIACRYPT 2012 Book in PDF, Epub and Kindle

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.