Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes
Title | Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF eBook |
Author | B. Preneel |
Publisher | IOS Press |
Pages | 284 |
Release | 2009-05-27 |
Genre | Computers |
ISBN | 160750426X |
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008 by the Institute of Mathematics and Informatics of the Bulgarian Academy of Sciences in cooperation with COSIC, KU Leuven and in the framework of the NATO Science for Peace and Security program. Goal of the organizers was to gather international experts from both fields - coding theory and cryptography - in order to exchange ideas, define new challenges and open problems for future research. These proceedings present the state-of-the-art in the current research on cryptography applying techniques and results from coding theory. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes is divided into two parts. In the first part the papers based on the lectures of the invited speakers, and in the second part the papers based on the talks of the participants in the workshop are included.
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes
Title | Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes PDF eBook |
Author | Bart Preneel |
Publisher | IOS Press |
Pages | 284 |
Release | 2009 |
Genre | Computers |
ISBN | 1607500027 |
The NATO Advanced Research Workshop on Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes has been organized in Veliko Tarnovo, Bulgaria, on October 6-9, 2008. This title includes the papers based on the lectures of the invited speakers, and on the talks of the participants in the workshop.
Boolean Functions for Cryptography and Coding Theory
Title | Boolean Functions for Cryptography and Coding Theory PDF eBook |
Author | Claude Carlet |
Publisher | Cambridge University Press |
Pages | 577 |
Release | 2021-01-07 |
Genre | Computers |
ISBN | 1108473806 |
A complete, accessible book on single and multiple output Boolean functions in cryptography and coding, with recent applications and problems.
Mathematical Aspects of Computer and Information Sciences
Title | Mathematical Aspects of Computer and Information Sciences PDF eBook |
Author | Daniel Slamanig |
Publisher | Springer Nature |
Pages | 469 |
Release | 2020-03-18 |
Genre | Computers |
ISBN | 3030431207 |
This book constitutes the refereed proceedings of the 8th International Conference on Mathematical Aspects of Computer and Information Sciences, MACIS 2019, held in Gebze, Turkey, in November 2019. The 22 revised papers and 14 short papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in the following topical sections: algorithms and foundation; security and cryptography; combinatorics, codes, designs and graphs; data modeling and machine learning; tools and software track.
Finite Fields and Their Applications
Title | Finite Fields and Their Applications PDF eBook |
Author | Pascale Charpin |
Publisher | Walter de Gruyter |
Pages | 288 |
Release | 2013-05-28 |
Genre | Mathematics |
ISBN | 3110283603 |
This book is based on the invited talks of the "RICAM-Workshop on Finite Fields and Their Applications: Character Sums and Polynomials" held at the Federal Institute for Adult Education (BIfEB) in Strobl, Austria, from September 2-7, 2012. Finite fields play important roles in many application areas such as coding theory, cryptography, Monte Carlo and quasi-Monte Carlo methods, pseudorandom number generation, quantum computing, and wireless communication. In this book we will focus on sequences, character sums, and polynomials over finite fields in view of the above mentioned application areas: Chapters 1 and 2 deal with sequences mainly constructed via characters and analyzed using bounds on character sums. Chapters 3, 5, and 6 deal with polynomials over finite fields. Chapters 4 and 9 consider problems related to coding theory studied via finite geometry and additive combinatorics, respectively. Chapter 7 deals with quasirandom points in view of applications to numerical integration using quasi-Monte Carlo methods and simulation. Chapter 8 studies aspects of iterations of rational functions from which pseudorandom numbers for Monte Carlo methods can be derived. The goal of this book is giving an overview of several recent research directions as well as stimulating research in sequences and polynomials under the unified framework of character theory.
Security of Ubiquitous Computing Systems
Title | Security of Ubiquitous Computing Systems PDF eBook |
Author | Gildas Avoine |
Publisher | Springer Nature |
Pages | 268 |
Release | 2021-01-14 |
Genre | Computers |
ISBN | 3030105911 |
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
Advances in Cryptology -- ASIACRYPT 2012
Title | Advances in Cryptology -- ASIACRYPT 2012 PDF eBook |
Author | Xiaoyun Wang |
Publisher | Springer Science & Business Media |
Pages | 791 |
Release | 2012-11-19 |
Genre | Computers |
ISBN | 3642349617 |
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.