You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 10-volume set, LNCS 14920-14929 constitutes the refereed proceedings of the 44th Annual International Cryptology Conference, CRYPTO 2024. The conference took place at Santa Barbara, CA, USA, during August 18-22, 2024. The 143 full papers presented in the proceedings were carefully reviewed and selected from a total of 526 submissions. The papers are organized in the following topical sections: Part I: Digital signatures; Part II: Cloud cryptography; consensus protocols; key exchange; public key encryption; Part III: Public-key cryptography with advanced functionalities; time-lock cryptography; Part IV: Symmetric cryptanalysis; symmetric cryptograph; Part V: Mathematical assumptions; secret sharing; theoretical foundations; Part VI: Cryptanalysis; new primitives; side-channels and leakage; Part VII: Quantum cryptography; threshold cryptography; Part VIII: Multiparty computation; Part IX: Multiparty computation; private information retrieval; zero-knowledge; Part X: Succinct arguments.
Algebra and number theory have always been counted among the most beautiful and fundamental mathematical areas with deep proofs and elegant results. However, for a long time they were not considered of any substantial importance for real-life applications. This has dramatically changed with the appearance of new topics such as modern cryptography, coding theory, and wireless communication. Nowadays we find applications of algebra and number theory frequently in our daily life. We mention security and error detection for internet banking, check digit systems and the bar code, GPS and radar systems, pricing options at a stock market, and noise suppression on mobile phones as most common examples. This book collects the results of the workshops "Applications of algebraic curves" and "Applications of finite fields" of the RICAM Special Semester 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world. They address old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.
As a spectroscopic method, Nuclear Magnetic Resonance (NMR) has seen spectacular growth over the past two decades, both as a technique and in its applications. Today the applications of NMR span a wide range of scientific disciplines, from physics to biology to medicine. Each volume of Nuclear Magnetic Resonance comprises a combination of annual and biennial reports which together provide comprehensive of the literature on this topic. This Specialist Periodical Report reflects the growing volume of published work involving NMR techniques and applications, in particular NMR of natural macromolecules which is covered in two reports: "NMR of Proteins and Acids" and "NMR of Carbohydrates, Lipids...
The two-volume proceedings LNCS 9056 + 9057 constitutes the proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, held in Sofia, Bulgaria, in April 2015. The 57 full papers included in these volumes were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections named: honorable mentions, random number generators, number field sieve, algorithmic cryptanalysis, symmetric cryptanalysis, hash functions, evaluation implementation, masking, fully homomorphic encryption, related-key attacks, fully monomorphic encryption, efficient two-party protocols, symmetric cryptanalysis, lattices, signatures, zero-knowledge proofs, leakage-resilient cryptography, garbled circuits, crypto currencies, secret sharing, outsourcing computations, obfuscation and e-voting, multi-party computations, encryption, resistant protocols, key exchange, quantum cryptography, and discrete logarithms.
This text offers an in-depth look at the properties, thermodynamic formation, structure, latest trends and scientific application of bio- and synthetic polymer gels.
Examines the intersection of quantum information and chemical physics The Advances in Chemical Physics series is dedicated to reviewing new and emerging topics as well as the latest developments in traditional areas of study in the field of chemical physics. Each volume features detailed comprehensive analyses coupled with individual points of view that integrate the many disciplines of science that are needed for a full understanding of chemical physics. This volume of the series explores the latest research findings, applications, and new research paths from the quantum information science community. It examines topics in quantum computation and quantum information that are related to or i...
Proceedings of a workshop held at the Scripps Institution of Oceanography, Dec. 7-9, 1981, organized under the auspices of the Center for Studies of Nonlinear Dynamics, La Jolla Institute.
Collects the 77 papers presented during the November 2002 symposium on the mathematical foundations of computing. Among the topics are abstract combinatorial programs and efficient property testers, a lower bound for testing 3-colorability in bounded degree graphs, a spectral algorithm for learning
Publishes papers that report results of research in statistical physics, plasmas, fluids, and related interdisciplinary topics. There are sections on (1) methods of statistical physics, (2) classical fluids, (3) liquid crystals, (4) diffusion-limited aggregation, and dendritic growth, (5) biological physics, (6) plasma physics, (7) physics of beams, (8) classical physics, including nonlinear media, and (9) computational physics.