5a17748913668.jpg
PDF
Sequences, Subsequences, and Consequences

Interested readers will find here the thoroughly refereed post-proceedings of the International Workshop of Sequences, Subsequences and Consequences, SSC 2007, held in Los Angeles, USA, in 2007. The 16 revised invited full papers and one revised contributed paper are presented together with three keynote lectures and were carefully reviewed and selected for the book. The theory of sequences has found practical applications in many ar...

5a1607ec317a4.jpeg
PDF
Pairing-Based Cryptography – Pairing 2013

This book constitutes the refereed proceedings of the 6th International Conference on Pairing-Based Cryptography, Pairing 2013, held in Beijing, China, in November 2013. The 14 full papers presented were carefully reviewed and selected from 59 submissions. As in previous years, the focus of Pairing 2013 is on all aspects of pairing-based cryptography, including: cryptographic primitives and protocols, mathematical foundations, softwa...

5a00143eaabf8.jpg
PDF
Public Key Cryptography - PKC 2009

This book constitutes the refereed proceedings of the 12th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2009, held in Irvine, CA, USA, in March 2009. The 28 revised full papers presented were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on number theory, applications and protocols, multi-party protocols, identity-based encryption, signatures, enc...

59fe6db5e7160.jpg
PDF
Cryptographic Hardware and Embedded Systems -- CHES 2014

This book constitutes the proceedings of the 16th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2014, held in Busan, South Korea, in September 2014. The 33 full papers included in this volume were carefully reviewed and selected from 127 submissions. They are organized in topical sections named: side-channel attacks; new attacks and constructions; countermeasures; algorithm specific SCA; ECC implementati...

59fd029d67702.jpg
PDF
Advances in Cryptology -- CRYPTO 2014, Part I

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; grou...

59fbfcf3bc212.jpg
PDF
Hacking Exposed Wireless, Third Edition

Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and...

59fbfcf263f5c.jpg
PDF
Advances in Cryptology -- CRYPTO 2014, Part II

The two volume-set, LNCS 8616 and LNCS 8617, constitutes the refereed proceedings of the 34th Annual International Cryptology Conference, CRYPTO 2014, held in Santa Barbara, CA, USA, in August 2014. The 60 revised full papers presented in LNCS 8616 and LNCS 8617 were carefully reviewed and selected from 227 submissions. The papers are organized in topical sections on symmetric encryption and PRFs; formal methods; hash functions; grou...

59fa7adce54f8.jpg
PDF
Environmental Science for a Changing World (2nd Edition)

Following real people and real science, Environmental Science for a Changing World provides a unique context for showing students how science works and how to think critically about environmental issues. Chapters don’t merely include interesting stories they are examples of science journalism at its best, combining Scientific American-style writing, layout, and graphics to tell compelling stories that exemplify important concepts and...

5966db211ccb3.jpg
PDF
Broadband Quantum Cryptography

Quantum cryptography is a rapidly developing field that draws from a number of disciplines, from quantum optics to information theory to electrical engineering. By combining some fundamental quantum mechanical principles of single photons with various aspects of information theory, quantum cryptography represents a fundamental shift in the basis for security from numerical complexity to the fundamental physical nature of the communic...

595f3007de590.jpg
PDF
Security Solutions and Applied Cryptography in Smart Grid Communications

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use. Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across ...