| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910438147803321 |
|
|
Autore |
Panchenko Dmitry |
|
|
Titolo |
The Sherrington-Kirkpatrick model / / Dmitry Panchenko |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, : Springer, c2013 |
|
|
|
|
|
|
|
ISBN |
|
1-299-33752-X |
1-4614-6289-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xii, 156 pages) |
|
|
|
|
|
|
Collana |
|
Springer monographs in mathematics, , 1439-7382 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Spin glasses - Mathematical models |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Preface -- 1 The Free Energy and Gibbs Measure -- 2 The Ruelle Probability Cascades -- 3 The Parisi Formula -- 4 Toward a Generalized Parisi Ansatz -- A Appendix -- Bibliography -- Notes and Comments -- References -- Index. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The celebrated Parisi solution of the Sherrington-Kirkpatrick model for spin glasses is one of the most important achievements in the field of disordered systems. Over the last three decades, through the efforts of theoretical physicists and mathematicians, the essential aspects of the Parisi solution were clarified and proved mathematically. The core ideas of the theory that emerged are the subject of this book, including the recent solution of the Parisi ultrametricity conjecture and a conceptually simple proof of the Parisi formula for the free energy. The treatment is self-contained and should be accessible to graduate students with a background in probability theory, with no prior knowledge of spin glasses. The methods involved in the analysis of the Sherrington-Kirkpatrick model also serve as a good illustration of such classical topics in probability as the Gaussian interpolation and concentration of measure, Poisson processes, and representation results for exchangeable arrays. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910624391103321 |
|
|
Autore |
Easttom Chuck |
|
|
Titolo |
Modern Cryptography : Applied Mathematics for Encryption and Information Security / / by William Easttom |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9783031123047 |
9783031123030 |
|
|
|
|
|
|
|
|
Edizione |
[2nd ed. 2022.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (460 pages) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Data structures (Computer science) |
Information theory |
Number theory |
Data protection |
Computational intelligence |
Statistics |
Communications Engineering, Networks |
Data Structures and Information Theory |
Computational Number Theory |
Data and Information Security |
Computational Intelligence |
Applied Statistics |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Chapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800’s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. |
|
|
|
|
|
|
|
|
|
|
|
Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography. |
|
|
|
|
|
|
Sommario/riassunto |
|
This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q&A, and examples. . |
|
|
|
|
|
|
|
| |