Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Algebraic Curves in Cryptography (Discrete Mathematics and Its Applications)

Buy

The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptography yet these other application areas have not been systematically covered in the literature. Addressing this gap, Algebraic Curves in Cryptography explores the rich uses of algebraic curves in a range of cryptographic applications, such as secret sharing, frameproof codes, and broadcast encryption.

Suitable for researchers and graduate students in mathematics and computer science, this self-contained book is one of the first to focus on many topics in cryptography involving algebraic curves. After supplying the necessary background on algebraic curves, the authors discuss error-correcting codes, including algebraic geometry codes, and provide an introduction to elliptic curves. Each chapter in the remainder of the book deals with a selected topic in cryptography (other than elliptic curve cryptography). The topics covered include secret sharing schemes, authentication codes, frameproof codes, key distribution schemes, broadcast encryption, and sequences. Chapters begin with introductory material before featuring the application of algebraic curves.

(HTML tags aren't allowed.)

Analysis of Biological Networks (Wiley Series in Bioinformatics)
Analysis of Biological Networks (Wiley Series in Bioinformatics)
An introduction to biological networks and methods for their analysis

Analysis of Biological Networks is the first book of its kind to provide readers with a comprehensive introduction to the structural analysis of biological networks at the interface of biology and computer science. The book begins with a brief overview of biological networks...

Beginning Digital Image Processing: Using Free Tools for Photographers
Beginning Digital Image Processing: Using Free Tools for Photographers

Since the advent of digital photography, we have been able to post-process our pictures. However, to do it properly, we have to become digital art apprentices. Sebastian Montabone is a computer vision expert who wants us to use our cameras and image processing software to come up with works of art. In this book, he teaches image processing...

Constraint Satisfaction Techniques for Agent-Based Reasoning
Constraint Satisfaction Techniques for Agent-Based Reasoning

An important aspect of multi agent systems are agent reasoning techniques for problem solving, either at the level of a single agent or at the level of distributed collaboration amongst multiple agents.

Constraint Satisfaction Problems (CSP) prove to be a generic framework which can be applied for modeling and solving a wide range...


Karl Moore's Visual Basic .NET: The Tutorials
Karl Moore's Visual Basic .NET: The Tutorials

Most programming books are about as exciting as Bill Gates' left ear. But with this latest eye-opening release, technology author Karl Moore shows it doesn't have to be quite so dull and uninspiring. Split into eight dynamic parts, Karl Moore's Visual Basic .Net covers every key area of real-life computer...

It's Your Biz: The Complete Guide to Becoming Your Own Boss
It's Your Biz: The Complete Guide to Becoming Your Own Boss
I have often credited ignorance with the starting and building of my business in 1977. I believe that if I had known what I was getting into, I would never have done it in the first place. But that is not a prescription for success, only for taking the risk. I probably could have gotten a lot further, and a lot faster, if this...
Innocent Code : A Security Wake-Up Call for Web Programmers
Innocent Code : A Security Wake-Up Call for Web Programmers
This book is an entertaining read, that shows how to change your mindset from website construction to website destruction so as to avoid writing dangerous code.

This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to--or break...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy