Listing 1 - 9 of 9
Sort by

Book
Cryptographic engineering.
Author:
ISBN: 9780387718170 9780387718163 Year: 2008 Publisher: New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptographic Engineering covers the theory and practice of engineering of cryptographic systems, including encryption and decryption engines, digital signature and authentication systems, true random number generators, and the design, implementation, testing, and validation of cryptographic systems. This book also addresses cryptanalysis of security systems for the purpose of checking their robustness and their strength against attacks, and building countermeasures in order to thwart such attacks by reducing their probability of success. The material includes four important features: ASIC and FPGA hardware design for cryptography, Principles and practice of true random number generators, Detailed algorithmic treatment of public-key cryptographic systems and emphasis on the engineering of systems, and Side-channel attacks on cryptographic systems and countermeasure designs. Cryptographic Engineering is a comprehensive text that is suitable as a handbook for hardware and software engineers who are interested in building secure systems using cryptographic techniques.


Book
Interactive Media: The Semiotics of Embodied Interaction
Author:
ISBN: 9781848000360 1848000359 9781848000353 9786611792046 1281792047 1848000367 Year: 2008 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Interactive media is pervasive. The colonization of our everyday lives by the computational power of the silicon chip is a fundamental feature of our digital age, and raises important questions such as: What does this mean for us as inhabitants of such media rich environments? How can we make sense of these media and the ways in which they have changed our interactions? What theories can we draw on to help us make sense of life in the digital age? Human Computer Interaction has been looking at versions of these questions for a long time now, but as technology advances so quickly it is hard to keep pace with the changes. In reflecting on some of these issues and by providing a way to relate some of the disparate threads of theory from fields such as phenomenology, cognitive science, semiotics and the ecological theory of perception, Shaleph O’Neill provides an exploration of the theories that impact our understanding over a spectrum of interactive media. Dr. Shaleph O’Neill is Course Director of Interactive Media Design at the University of Dundee.


Book
An introduction to mathematical cryptography
Authors: --- ---
ISBN: 9780387779935 9780387779942 0387779930 9786611954215 1281954217 0387779949 Year: 2008 Publisher: New York (N.Y.): Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required of the reader; techniques from algebra, number theory, and probability are introduced and developed as required. The book covers a variety of topics that are considered central to mathematical cryptography. Key topics include: * classical cryptographic constructions, such as Diffie-Hellmann key exchange, discrete logarithm-based cryptosystems, the RSA cryptosystem, and digital signatures; * fundamental mathematical tools for cryptography, including primality testing, factorization algorithms, probability theory, information theory, and collision algorithms; * an in-depth treatment of important recent cryptographic innovations, such as elliptic curves, elliptic curve and pairing-based cryptography, lattices, lattice-based cryptography, and the NTRU cryptosystem. This book is an ideal introduction for mathematics and computer science students to the mathematical foundations of modern cryptography. The book includes an extensive bibliography and index; supplementary materials are available online.

Keywords

Computer science --- Cryptography --- Cryptographie --- Mathematics. --- Mathématiques --- Mathematics --- Coding theory. --- Cryptography --Mathematics. --- Coding theory --- Education --- Social Sciences --- Physical Sciences & Mathematics --- Algebra --- Book Studies & Arts --- Signs and symbols. --- Mathématiques --- EPUB-LIV-FT LIVMATHE LIVSTATI SPRINGER-B --- Representation, Symbolic --- Semeiotics --- Signs --- Symbolic representation --- Symbols --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Data structures (Computer science). --- Data encryption (Computer science). --- Algebra. --- Ordered algebraic structures. --- Information theory. --- Number theory. --- Number Theory. --- Coding and Information Theory. --- Data Structures, Cryptology and Information Theory. --- Data Encryption. --- Information and Communication, Circuits. --- Order, Lattices, Ordered Algebraic Structures. --- Abbreviations --- Omens --- Semiotics --- Sign language --- Symbolism --- Visual communication --- Signs and symbols --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cryptology. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Mathematical analysis --- Math --- Science --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Number study --- Numbers, Theory of --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Communication theory --- Communication --- Cybernetics --- Algebraic structures, Ordered --- Structures, Ordered algebraic --- Cryptography - Mathematics


Book
De beeldentaal van symbolen.
Authors: --- --- ---
ISBN: 904030159X 9789040301599 Year: 2002 Volume: 7 Publisher: Brussel Ministerie van de Vlaamse Gemeenschap. Afdeling Monumenten en landschappen

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Sculpture --- symbolism [artistic concept] --- Belgian [modern] --- Architecture --- Semiotics --- Art --- monuments --- Flanders --- Decoration and ornament, Architectural --- Symbolism in architecture --- Symbolism in art --- Sculpture, Flemish --- Historic buildings --- Décoration et ornement architecturaux --- Symbolisme en architecture --- Symbolisme dans l'art --- Sculpture flamande --- Monuments historiques --- iconografie --- symbolen --- cultureel erfgoed --- Vlaanderen --- Symboliek in monumenten --- 378.4 <493 KUL> --- 949.32 LEUVEN --- -Historic buildings --- -Symbolism in architecture --- -Symbolism in art --- -#A0301A --- 581 Monumentenbescherming, cultureel erfgoed --- Naslagwerken ; symbolen ; in architectuur en kunst --- Monumenten en Landschappen ; M & L cahiers --- Grafmonumenten ; funeraire symbolen --- Parken ; tuinen ; standbeelden ; symbolen --- Iconologie --- Mausolea --- 7.04(035) --- symboliek --- monumenten --- monumentenzorg --- 7.04 --- 710.3 --- Architectuur-symboliek --- Beeldhouwkunst-symboliek --- Allegory (Art) --- Signs and symbols in art --- Architectural symbolism --- Signs and symbols in architecture --- Historic houses, etc. --- Historical buildings --- Buildings --- Monuments --- Historic sites --- Architectural decoration and ornament --- Stonework, Decorative --- Architectural design --- Exterior walls --- Universiteiten: Katholieke Universiteit Leuven--KUL --- Geschiedenis van België: hertogdom Brabant; provincie Brabant--(reg./lok.)--LEUVEN --- Iconografie ; handboeken --- iconologie en iconografie --- Decoration and ornament --- #A0301A --- 949.32 LEUVEN Geschiedenis van België: hertogdom Brabant; provincie Brabant--(reg./lok.)--LEUVEN --- 378.4 <493 KUL> Universiteiten: Katholieke Universiteit Leuven--KUL --- Décoration et ornement architecturaux --- C3 --- Kunst en cultuur --- Grafmonumenten--funeraire symbolen --- Monumenten en Landschappen--M & L cahiers --- Naslagwerken--symbolen--in architectuur en kunst --- Parken--tuinen--standbeelden--symbolen --- Architectuur--symboliek --- Beeldhouwkunst--symboliek --- Iconografie--handboeken --- Geschiedenis van België: hertogdom Brabant--provincie Brabant--(reg./lok.)--LEUVEN --- Decoration and ornament, Architectural - Belgium - Flanders. --- Symbolism in architecture - Belgium - Flanders. --- Symbolism in art - Belgium - Flanders. --- Historic buildings - Belgium - Flanders. --- Vlaamse school --- Vlaanderen.


Book
Procedural Semantics for Hyperintensional Logic : Foundations and Applications of Transparent Intensional Logic
Authors: --- ---
ISBN: 9789048188123 9789048188116 9048188113 9786612927645 1282927647 9048188121 Year: 2010 Publisher: Dordrecht : Springer Netherlands : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

July 2011 -- The Council of the Academy of Sciences of the Czech Republic has presented Procedural Semantics for Hyperintensional Logic with its prestigious award for outstanding results of major scientific importance. This volume sets out the foundations of Transparent Intensional Logic, together with many applications to a wide range of topics including formal semantics, philosophy of language, and philosophical logic. Special attention is devoted to some topics that generally tend to be dealt with only in passing. They include, inter alia, notional attitudes, knowing whether, concepts (understood rigorously and non-mentalistically), attitudes de re, and anaphora in hyperintensional contexts. The overall programme is set out and placed in historical and systematic context. The programme consists in devising one overarching semantic theory for all sorts of discourse, whether colloquial, scientific, mathematical or logical. The semantic theory is a procedural one, according to which sense is an abstract, pre-linguistic procedure detailing what operations to apply to what procedural constituents to arrive at the product (if any) of the procedure. Such procedures are rigorously defined as so-called constructions residing in a platonic realm. The semantics is tailored to the hardest case, as constituted by hyperintensional contexts, and generalized from there to intensional and extensional contexts. This anti-contextualist and fully compositional semantics is, to the best of our knowledge, the only one that deals with all kinds of context in a unique and systematic manner. The three authors have striven to write an accessible study of Transparent Intensional Logic that may be read by researchers and advanced students of logic, semantics, linguistics, informatics, computer science, and kindred disciplines.


Book
Codes: An Introduction to Information Communication and Cryptography
Author:
ISBN: 9781848002739 1848002726 9781848002722 9786611954901 128195490X 1848002734 Year: 2008 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle it, for example, mobile phones, digital cameras, and personal computers. This book is an integrated introduction to the mathematics of coding, that is, replacing information expressed in symbols, such as a natural language or a sequence of bits, by another message using (possibly) different symbols. There are three main reasons for doing this: economy, reliability, and security, and each is covered in detail. Only a modest mathematical background is assumed, the mathematical theory being introduced at a level that enables the basic problems to be stated carefully, but without unnecessary abstraction. Other features include: clear and careful exposition of fundamental concepts, including optimal coding, data compression, and public-key cryptography; concise but complete proofs of results; coverage of recent advances of practical interest, for example in encryption standards, authentication schemes, and elliptic curve cryptography; numerous examples and exercises, and a full solutions manual available to lecturers from www.springer.com This modern introduction to all aspects of coding is suitable for advanced undergraduate or postgraduate courses in mathematics, computer science, electrical engineering, or informatics. It is also useful for researchers and practitioners in related areas of science, engineering and economics.

Keywords

Mathematics. --- Combinatorics. --- Coding and Information Theory. --- Communications Engineering, Networks. --- Number Theory. --- Information and Communication, Circuits. --- Data Structures, Cryptology and Information Theory. --- Data structures (Computer science). --- Coding theory. --- Number theory. --- Telecommunication. --- Mathématiques --- Structures de données (Informatique) --- Codage --- Théorie des nombres --- Télécommunications --- Cryptography --- Cryptography. --- Coding theory --- Mathematics --- Physical Sciences & Mathematics --- Algebra --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer science. --- Information theory. --- Electrical engineering. --- Computer Science. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Math --- Science --- Number study --- Numbers, Theory of --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Telecommuting --- Combinatorics --- Mathematical analysis --- Electric engineering --- Engineering --- Communication theory --- Cybernetics


Book
Understanding cryptography : a textbook for students and practitioners
Authors: ---
ISBN: 9783642041013 9783642041006 3642041000 3642041019 3642446493 9786613563170 1280385251 Year: 2010 Publisher: Heidelberg ; New York Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Keywords

Computer Science. --- Data Structures, Cryptology and Information Theory. --- Circuits and Systems. --- Systems and Data Security. --- Computer science. --- Data protection. --- Data structures (Computer science). --- Systems engineering. --- Informatique --- Protection de l'information (Informatique) --- Structures de données (Informatique) --- Ingénierie des systèmes --- Cryptography. --- Cryptography --- Data encryption (Computer science) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Mathematics. --- Cryptography -- Mathematics. --- Data encryption (Computer science). --- Electronic books. -- local. --- Book Studies & Arts --- Computer Science --- Engineering & Applied Sciences --- Education --- Social Sciences --- Mathematics --- Computer programming. --- Computer security. --- Electrical engineering. --- Electronic circuits. --- Programming Techniques. --- Communications Engineering, Networks. --- Data structures (Computer scienc. --- Telecommunication. --- Data Structures and Information Theory. --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Informatics --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Design and construction --- Protection --- Security measures --- Electron-tube circuits --- Electric circuits --- Electron tubes --- Electronics --- Electric engineering --- Electronic computer programming --- Electronic data processing --- Programming (Electronic computers) --- Coding theory --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Programming


Book
Verborgen verhalen : betekenissen van Vlaamse & Nederlandse schilderijen 15e-18e eeuw
Authors: --- ---
ISBN: 907658849X Year: 2003 Publisher: Amsterdam Ludion

Loading...
Export citation

Choose an application

Bookmark

Abstract

47

Keywords

Iconografie ; schilderkunst ; Nederlanden ; 15de tot 18de eeuw --- 704 --- Iconografie. --- iconografie --- 15de eeuw --- 16de eeuw --- 17de eeuw --- 18de eeuw --- Noordelijke Nederlanden --- Zuidelijke Nederlanden --- iconography --- realisme --- History --- Painting --- schilderkunst --- painting [image-making] --- realism [artistic form of expression] --- anno 1300-1399 --- anno 1500-1799 --- anno 1400-1499 --- Belgium --- Netherlands --- Art appreciation --- Art --- Painting, Dutch --- Painting, Flemish --- Symbolism in art --- kunst --- musea --- schilderijen --- vijftiende eeuw --- zestiende eeuw --- zeventiende eeuw --- #KVHA:Kunst --- #KVHA:Kunstgeschiedenis --- #KVHA:Realisme --- #KVHA:Schilderkunst --- 75.04 "14/17" --- 75.04 "14/17" Iconografie van de schilderkunst. Iconologie. Onderwerpen voor de schilderkunst--?"14/17" --- Iconografie van de schilderkunst. Iconologie. Onderwerpen voor de schilderkunst--?"14/17" --- Allegory (Art) --- Signs and symbols in art --- Flemish painting --- Dutch painting --- Art, Occidental --- Art, Visual --- Art, Western (Western countries) --- Arts, Fine --- Arts, Visual --- Fine arts --- Iconography --- Occidental art --- Visual arts --- Western art (Western countries) --- Arts --- Aesthetics --- Appreciation of art --- Art criticism --- Themes, motives --- Analysis, interpretation, appreciation --- #GGSB: Kunst --- Schilderkunst --- Symbolen --- Symboliek --- Symbool --- Tekenkunst --- Reception of art --- Reception --- Kunst --- Art, Primitive --- Hollandse school --- Nederlandse school --- Vlaamse school --- 15de eeuw. --- 16de eeuw. --- 17de eeuw. --- 18de eeuw. --- Noordelijke Nederlanden. --- Zuidelijke Nederlanden.

A Classical Introduction to Cryptography Exercise Book
Authors: --- --- --- ---
ISBN: 9780387279343 9780387288352 0387279342 038728835X 9786610969425 1280969423 Year: 2006 Publisher: New York, NY : Springer US : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material. It was used by the authors or given as examinations to undergraduate and graduate-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005. A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications Security covers a majority of the subjects that make up today's cryptology, such as symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require a large background in mathematics, since the most important notions are introduced and discussed in many of the exercises. The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, as well as computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.

Keywords

Computer security --- Cryptography --- 681.3*E1 --- 681.3*E3 --- 681.3*E4 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E1 Data structures: arrays; graphs; lists; tables; trees --- Data structures: arrays; graphs; lists; tables; trees --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Protection --- Security measures --- Computer security. --- Cryptography. --- Sécurité informatique --- Cryptographie --- Problems, exercises, etc. --- Problèmes et exercices --- EPUB-LIV-FT LIVINFOR SPRINGER-B --- Data encryption (Computer science). --- Information theory. --- Computer Communication Networks. --- Data structures (Computer science) --- Coding theory. --- Data transmission systems. --- Cryptology. --- Theory of Computation. --- Data Structures and Information Theory. --- Coding and Information Theory. --- Input/Output and Data Communications. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Data communication systems --- Transmission of data --- Digital communications --- Electronic systems --- Information theory --- Telecommunication systems --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computers. --- Computer communication systems. --- Data structures (Computer science). --- Input-output equipment (Computers). --- Computer hardware --- Computer I/O equipment --- Electronic analog computers --- Hardware, Computer --- I/O equipment (Computers) --- Input equipment (Computers) --- Input-output equipment (Computers) --- Output equipment (Computers) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Calculators --- Cyberspace --- Input-output equipment --- Distributed processing

Listing 1 - 9 of 9
Sort by