02880nam 2200505 450 991080861500332120230808205231.01-119-31864-51-119-31863-71-119-31862-9(CKB)4330000000010227(EBL)4560567(MiAaPQ)EBC4560567(Au-PeEL)EBL4560567(CaPaEBR)ebr11225539(CaONFJC)MIL933709(OCoLC)952248211(EXLCZ)99433000000001022720160714h20162016 uy 0engur|n|---|||||rdacontentrdamediardacarrierDigital electronics1Combinational logic circuits /Tertulien NdjountcheLondon, England ;Hoboken, New Jersey :ISTE :Wiley,2016.©20161 online resource (288 p.)Description based upon print version of record.1-84821-984-9 Includes bibliographical references and index.Intro; Table of Contents; Title; Copyright; Preface; 1 Number Systems; 2 Logic Gates; 3 Function Blocks of Combinational Logic; 4 Systematic Methods for the Simplification of Logic Functions; Bibliography; Index; End User License Agreement; 1. Summary; 2. The reader; 1.1. Introduction; 1.2. Decimal numbers; 1.3. Binary numbers; 1.4. Octal numbers; 1.5. Hexadecimal numeration; 1.6. Representation in a radix B; 1.7. Binary-coded decimal numbers; 1.8. Representations of signed integers; 1.9. Representation of the fractional part of a number; 1.10. Arithmetic operations on binary numbers1.11. Representation of real numbers1.12. Data representation; 1.13. Codes to protect against errors; 1.14. Exercises; 1.15. Solutions; 2.1. Introduction; 2.2. Logic gates; 2.3. Three-state buffer; 2.4. Logic function; 2.5. The correspondence between a truth table and a logic function; 2.6. Boolean algebra; 2.7. Multi-level logic circuit implementation; 2.8. Practical considerations; 2.9. Demonstration of some Boolean algebra identities; 2.10. Exercises; 2.11. Solutions; 3.1. Introduction; 3.2. Multiplexer; 3.3. Demultiplexer and decoder3.4. Implementation of logic functions using multiplexers or decoders3.5. Encoders; 3.6. Transcoders; 3.7. Parity check generator; 3.8. Barrel shifter; 3.9. Exercises; 3.10. Solutions; 4.1. Introduction; 4.2. Definitions and reminders; 4.3. Karnaugh maps; 4.4. Systematic methods for simplification; 4.5. Exercises; 4.6. SolutionsLogic circuitsLogic circuits.621.38195835Ndjountche Tertulien864770MiAaPQMiAaPQMiAaPQBOOK9910808615003321Digital electronics4030642UNINA03850nam 22008055 450 991048366430332120251226202736.03-662-53890-310.1007/978-3-662-53890-6(CKB)3710000000981138(DE-He213)978-3-662-53890-6(MiAaPQ)EBC6296641(MiAaPQ)EBC5578507(Au-PeEL)EBL5578507(OCoLC)963936344(PPN)19713713X(EXLCZ)99371000000098113820161108d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – ASIACRYPT 2016 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /edited by Jung Hee Cheon, Tsuyoshi Takagi1st ed. 2016.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2016.1 online resource (XXIV, 1055 p. 198 illus.) Security and Cryptology,2946-1863 ;100323-662-53889-X Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation.The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.Security and Cryptology,2946-1863 ;10032CryptographyData encryption (Computer science)Data protectionCoding theoryInformation theoryElectronic data processingManagementComputer scienceComputer scienceMathematicsCryptologyData and Information SecurityCoding and Information TheoryIT OperationsTheory of ComputationMathematics of ComputingCryptography.Data encryption (Computer science).Data protection.Coding theory.Information theory.Electronic data processingManagement.Computer science.Computer scienceMathematics.Cryptology.Data and Information Security.Coding and Information Theory.IT Operations.Theory of Computation.Mathematics of Computing.005.824Cheon Jung Heeedthttp://id.loc.gov/vocabulary/relators/edtTakagi Tsuyoshiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910483664303321Advances in Cryptology – ASIACRYPT 20162809400UNINA