1
Mesnager, Sihem
2023
Table of Contents:
“... Cryptography -- Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4 -- Coding theory -- Two Classes of Constacyclic Codes with Variable Parameters -- Near MDS Codes with Dimension 4 and Their Application in Locally Recoverable...”2023
Full text
2
3
4
Bast, Hannah
2022
Table of Contents:
“... for Big Data and their Applications Scalable Cryptography -- Distributed Data Streams -- Energy-Efficient Scheduling -- The GENO Software Stack -- Laue Algorithms for Big Data Problems in de Novo Genome Assembly -- Scalable Text Index Construction. Big Data...”2022
Full text
5
Berger, Ulrich
2022
Table of Contents:
“...Bio-computing -- Blockchain -- Combinatory Logic -- Computable Analysis -- Computational Complexity -- Computability in Mathematics -- Computability in Set Theory -- Computability Theory -- Constructive Mathematics -- Cryptography -- Foundations...”2022
Full text
6
Bera, Rajendra K.
2020
Table of Contents:
“...1. Quantum Cryptography & Quantum Teleportation -- 2. A Quick Comparison of Quantum & Classical Mechanics -- 3. The Birth and Coming of Age of Quantum Mechanics -- 4. Laws of Quantum Mechanics -- 5. Weirdness of Quantum Mechanics -- 6. Mathematical...”2020
Full text
7
8
Pieprzyk, Josef
2017
Table of Contents:
“...Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy...”2017
Full text
9
10
Table of Contents:
“...Algorithms and data structures -- Combinatorial optimization -- Constraint solving -- Computational complexity -- Cryptography -- Combinatorics in computer science -- Formal languages and automata -- Computational models and concepts -- Algorithms...”
Full text
Full text
11
Beckmann, Arnold
2016
Table of Contents:
“...Computable and constructive analysis -- Computation in biological systems -- Cryptography and information theory -- History and philosophy of computing -- Symbolic dynamics -- Weak arithmetic....”2016
Full text
12
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
13
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
14
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
15
Brlek, Srečko
2016
Table of Contents:
“... -- Symbolic dynamics; decision problems -- Relationships to complexity theory and logic; picture description and analysis -- Polyominoes and bidimentional patterns; cryptography; concurrency -- Cellular automata; bio-inspried computing; quantum computing....”2016
Full text
16
17
Catania, Barbara
2016
Table of Contents:
“...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...”2016
Full text
18
19
20