Pairing-Based Cryptography -- Pairing 2012

Pairing-Based Cryptography -- Pairing 2012

Author: Michel Abdalla

Publisher: Springer

Published: 2013-02-01

Total Pages: 348

ISBN-13: 3642363342

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applications.


Guide to Pairing-Based Cryptography

Guide to Pairing-Based Cryptography

Author: Nadia El Mrabet

Publisher: CRC Press

Published: 2017-01-06

Total Pages: 587

ISBN-13: 1315353148

DOWNLOAD EBOOK

This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.


Advances in Cryptology -- ASIACRYPT 2012

Advances in Cryptology -- ASIACRYPT 2012

Author: Xiaoyun Wang

Publisher: Springer Science & Business Media

Published: 2012-11-19

Total Pages: 791

ISBN-13: 3642349617

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.


Pairing-Based Cryptography -- Pairing 2013

Pairing-Based Cryptography -- Pairing 2013

Author: Zhenfu Cao

Publisher: Springer

Published: 2014-01-27

Total Pages: 260

ISBN-13: 3319048732

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, software and hardware implementation, as well as applied security.


Progress in Cryptology - INDOCRYPT 2012

Progress in Cryptology - INDOCRYPT 2012

Author: Steven Galbraith

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 577

ISBN-13: 3642349315

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.


A Mathematical Approach to Research Problems of Science and Technology

A Mathematical Approach to Research Problems of Science and Technology

Author: Ryuei Nishii

Publisher: Springer

Published: 2014-07-14

Total Pages: 497

ISBN-13: 4431550607

DOWNLOAD EBOOK

This book deals with one of the most novel advances in mathematical modeling for applied scientific technology, including computer graphics, public-key encryption, data visualization, statistical data analysis, symbolic calculation, encryption, error correcting codes, and risk management. It also shows that mathematics can be used to solve problems from nature, e.g., slime mold algorithms. One of the unique features of this book is that it shows readers how to use pure and applied mathematics, especially those mathematical theory/techniques developed in the twentieth century, and developing now, to solve applied problems in several fields of industry. Each chapter includes clues on how to use "mathematics" to solve concrete problems faced in industry as well as practical applications. The target audience is not limited to researchers working in applied mathematics and includes those in engineering, material sciences, economics, and life sciences.


Algebraic Curves and Finite Fields

Algebraic Curves and Finite Fields

Author: Harald Niederreiter

Publisher: Walter de Gruyter GmbH & Co KG

Published: 2014-08-20

Total Pages: 254

ISBN-13: 3110317915

DOWNLOAD EBOOK

Algebra and number theory have always been counted among the most beautiful and fundamental mathematical areas with deep proofs and elegant results. However, for a long time they were not considered of any substantial importance for real-life applications. This has dramatically changed with the appearance of new topics such as modern cryptography, coding theory, and wireless communication. Nowadays we find applications of algebra and number theory frequently in our daily life. We mention security and error detection for internet banking, check digit systems and the bar code, GPS and radar systems, pricing options at a stock market, and noise suppression on mobile phones as most common examples. This book collects the results of the workshops "Applications of algebraic curves" and "Applications of finite fields" of the RICAM Special Semester 2013. These workshops brought together the most prominent researchers in the area of finite fields and their applications around the world. They address old and new problems on curves and other aspects of finite fields, with emphasis on their diverse applications to many areas of pure and applied mathematics.


Innovations in Bio-Inspired Computing and Applications

Innovations in Bio-Inspired Computing and Applications

Author: Ajith Abraham

Publisher: Springer

Published: 2018-03-09

Total Pages: 391

ISBN-13: 3319763547

DOWNLOAD EBOOK

This book highlights recent research results in Bio-Inspired Computing and Applications. It presents 33 selected papers from the 8th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2017), which was held in Marrakesh, Morocco from December 11 to 13, 2017. A premier conference in the nature-inspired computing field, IBICA is intended to bring together the world’s leading researchers and practitioners interested in advancing the state of the art in biologically inspired computing, allowing them to exchange notes on a broad range of disciplines. The book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.


Financial Cryptography and Data Security

Financial Cryptography and Data Security

Author: Rainer Böhme

Publisher: Springer

Published: 2014-10-07

Total Pages: 252

ISBN-13: 3662447746

DOWNLOAD EBOOK

This books constitutes the thoroughly refereed papers and poster abstracts from the FC 2014 Workshops, the First Workshop on Bitcoin Research, BITCOIN 2014, and the Second Workshop on Applied Homomorphic Cryptography and Encrypted Computing, WAHC 2014, co-located with the 18th International Conference on Financial Cryptography and Data Security, held in Christ Church, Barbados, on March 7, 2014. The 15 full papers and 3 poster abstracts presented were carefully reviewed and selected from 30 submissions. They are grouped in topical sections on Bitcoin transactions, policy and legal issues; Bitcoin security; improving digital currencies; posters, and WAHC papers.