12 × 12 Schlüsselkonzepte zur Mathematik [[electronic resource] /] / von Oliver Deiser, Caroline Lasser, Elmar Vogt, Dirk Werner |
Autore | Deiser Oliver |
Edizione | [2nd ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Spektrum, , 2016 |
Descrizione fisica | 1 online resource (XIII, 355 S. 44 Abb., 1 Abb. in Farbe.) |
Disciplina | 515 |
Soggetto topico |
Mathematical analysis
Analysis (Mathematics) Matrix theory Algebra Discrete mathematics Mathematical logic Analysis Linear and Multilinear Algebras, Matrix Theory Discrete Mathematics Mathematical Logic and Foundations |
ISBN | 3-662-47077-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | 1 Grundlagen -- 2 Zahlen -- 3 Zahlentheorie -- 4 Diskrete Mathematik -- 5 Lineare Algebra -- 6 Algebra -- 7 Elementare Analysis -- 8 Höhere Analysis -- 9 Topologie und Geometrie -- 10 Numerik -- 11 Stochastik -- 12 Mengenlehre und Logik -- Index. |
Record Nr. | UNINA-9910484823003321 |
Deiser Oliver
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Spektrum, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cryptology - ASIACRYPT 2009 [[electronic resource] ] : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings / / edited by Mitsuri Matsui |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 722 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer programming Discrete mathematics Algorithms Data structures (Computer science) Computer science—Mathematics Cryptology Programming Techniques Discrete Mathematics Algorithm Analysis and Problem Complexity Data Structures and Information Theory Discrete Mathematics in Computer Science |
Soggetto genere / forma |
Kongress.
Tokio (2009) |
ISBN | 3-642-10366-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing Blind Signatures -- Cryptanalysis: Sqaure and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience. |
Record Nr. | UNISA-996465928203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in Cryptology - ASIACRYPT 2009 [[electronic resource] ] : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Proceedings / / edited by Mitsuri Matsui |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIV, 722 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer programming Discrete mathematics Algorithms Data structures (Computer science) Computer science—Mathematics Cryptology Programming Techniques Discrete Mathematics Algorithm Analysis and Problem Complexity Data Structures and Information Theory Discrete Mathematics in Computer Science |
Soggetto genere / forma |
Kongress.
Tokio (2009) |
ISBN | 3-642-10366-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing Blind Signatures -- Cryptanalysis: Square and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience. |
Record Nr. | UNINA-9910483947503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Difference Equations and Discrete Dynamical Systems [[electronic resource] ] : ICDEA, Osaka, Japan, July 2016 / / edited by Saber Elaydi, Yoshihiro Hamaya, Hideaki Matsunaga, Christian Pötzsche |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (X, 282 p. 43 illus., 18 illus. in color.) |
Disciplina | 515.625 |
Collana | Springer Proceedings in Mathematics & Statistics |
Soggetto topico |
Difference equations
Functional equations Dynamics Ergodic theory Discrete mathematics Difference and Functional Equations Dynamical Systems and Ergodic Theory Discrete Mathematics |
ISBN | 981-10-6409-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I Papers by Plenary Speakers, Ryusuke Kon, Stable Bifurcations in Multi-Species Semelparous Population Models -- Christian Pötzsche, Dichotomy Spectra of Nonautonomous Linear Integrodifference Equations -- Sebastian J. Schreiber, A Dynamical Trichotomy for Structured Populations Experiencing Positive Density-Dependence in Stochastic Environments -- Petr Stehlík, Replicator Equations as Limits of Evolutionary Games on Complete Graphs -- Part II Contributed Papers, István Győri and László Horváth, Connection between Continuous and Discrete Delay and Halanay Type Inequalities -- Nobuyuki Higashimori, Hiroshi Fujiwara, and Yuusuke Iso, Convergence of Finite Difference Schemes Applied to the Cauchy Problems of Quasi-Linear Partial Differential Equations of the Normal Form -- Takashi Honda and Yukiko Iwata, Operator Theoretic Phenomena of the Markov Operators Which Are Induced by Stochastic Difference Equations -- Toshiyuki Kohno, On the Behavior of the Error in Numerical Iterative Method for PDE -- Jana Krejčová, Property B of the Four-Dimensional Neutral Difference System -- Mohammed-Tahar Laraba, Sorin Olaru and Silviu-Iulian Niculescu, On the Structure of Polyhedral Positive Invariant Sets with Respect to Delay Difference Equations -- Masakazu Onitsuka, On the Exponential Stability of Two-Dimensional Nonautonomous Difference Systems Which Have a Weighted Homogeneity of the Solution -- Mihály Pituk, A Corollary of a Theorem on Positive Solutions of Poincaré Difference Equations -- Youssef N. Raffoul, The Case for Large Contraction in Functional Difference Equations -- Mansoor Saburov and Khikmat Saburov, Reaching Consensus via Polynomial Stochastic Operators: A General Study -- Kaori Saito, On the Stability of an SIR Epidemic Discrete Model -- Jitsuro Sugie and Masahiko Tanaka, Nonoscillation of Second-Order Linear Equations Involving a Generalized Difference Operator -- Aiko Tanaka and Jun-ichi Itaya, An Evolutionary Game Model of Families' Voluntary Provision of Public Goods -- Wirot Tikjha and Evelina Lapierre, On the Periodic Behavior of a System of Piecewise Linear Difference Equations. |
Record Nr. | UNINA-9910254306003321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algebra for Applications [[electronic resource] ] : Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression / / by Arkadii Slinko |
Autore | Slinko Arkadii |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (376 pages) |
Disciplina | 512.9 |
Collana | Springer Undergraduate Mathematics Series |
Soggetto topico |
Algebra
Information theory Discrete mathematics Information and Communication, Circuits Discrete Mathematics |
ISBN | 3-030-44074-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Integers -- 2 Cryptology -- 3 Groups -- 4 Fields -- 5 Polynomials -- 6 Secret Sharing -- 7 Error-Correcting Codes -- 8 Compression -- Appendix A: GAP -- Appendix B: Miscellanea -- Solutions to Exercises -- Index. |
Record Nr. | UNINA-9910484931803321 |
Slinko Arkadii
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algebra for Applications [[electronic resource] ] : Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression / / by Arkadii Slinko |
Autore | Slinko Arkadii |
Edizione | [2nd ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (376 pages) |
Disciplina | 512.9 |
Collana | Springer Undergraduate Mathematics Series |
Soggetto topico |
Algebra
Information theory Discrete mathematics Information and Communication, Circuits Discrete Mathematics |
ISBN | 3-030-44074-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Integers -- 2 Cryptology -- 3 Groups -- 4 Fields -- 5 Polynomials -- 6 Secret Sharing -- 7 Error-Correcting Codes -- 8 Compression -- Appendix A: GAP -- Appendix B: Miscellanea -- Solutions to Exercises -- Index. |
Record Nr. | UNISA-996418186403316 |
Slinko Arkadii
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algebra for Applications [[electronic resource] ] : Cryptography, Secret Sharing, Error-Correcting, Fingerprinting, Compression / / by Arkadii Slinko |
Autore | Slinko Arkadii |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XIV, 328 p. 5 illus., 1 illus. in color.) |
Disciplina | 512.9 |
Collana | Springer Undergraduate Mathematics Series |
Soggetto topico |
Algebra
Information theory Discrete mathematics Information and Communication, Circuits Discrete Mathematics |
ISBN | 3-319-21951-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Integers -- Cryptology -- Groups -- Fields -- Polynomials -- Secret Sharing -- Error-Correcting Codes -- Compression -- Appendix A: GAP -- Appendix B: Miscellanies -- Solutions to Exercises. |
Record Nr. | UNINA-9910299768303321 |
Slinko Arkadii
![]() |
||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algebraic Topology of Finite Topological Spaces and Applications [[electronic resource] /] / by Jonathan A. Barmak |
Autore | Barmak Jonathan A |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XVII, 170p. 35 illus.) |
Disciplina | 514.2 |
Collana | Lecture Notes in Mathematics |
Soggetto topico |
Algebraic topology
Combinatorics Convex geometry Discrete geometry Algebra Ordered algebraic structures Manifolds (Mathematics) Complex manifolds Discrete mathematics Algebraic Topology Convex and Discrete Geometry Order, Lattices, Ordered Algebraic Structures Manifolds and Cell Complexes (incl. Diff.Topology) Discrete Mathematics |
ISBN | 3-642-22003-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Preliminaries -- 2 Basic topological properties of finite spaces -- 3 Minimal finite models -- 4 Simple homotopy types and finite spaces -- 5 Strong homotopy types -- 6 Methods of reduction -- 7 h-regular complexes and quotients -- 8 Group actions and a conjecture of Quillen -- 9 Reduced lattices -- 10 Fixed points and the Lefschetz number -- 11 The Andrews-Curtis conjecture. |
Record Nr. | UNISA-996466642803316 |
Barmak Jonathan A
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algebraic Topology of Finite Topological Spaces and Applications [[electronic resource] /] / by Jonathan A. Barmak |
Autore | Barmak Jonathan A |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XVII, 170p. 35 illus.) |
Disciplina | 514.2 |
Collana | Lecture Notes in Mathematics |
Soggetto topico |
Algebraic topology
Combinatorics Convex geometry Discrete geometry Algebra Ordered algebraic structures Manifolds (Mathematics) Complex manifolds Discrete mathematics Algebraic Topology Convex and Discrete Geometry Order, Lattices, Ordered Algebraic Structures Manifolds and Cell Complexes (incl. Diff.Topology) Discrete Mathematics |
ISBN | 3-642-22003-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1 Preliminaries -- 2 Basic topological properties of finite spaces -- 3 Minimal finite models -- 4 Simple homotopy types and finite spaces -- 5 Strong homotopy types -- 6 Methods of reduction -- 7 h-regular complexes and quotients -- 8 Group actions and a conjecture of Quillen -- 9 Reduced lattices -- 10 Fixed points and the Lefschetz number -- 11 The Andrews-Curtis conjecture. |
Record Nr. | UNINA-9910484422303321 |
Barmak Jonathan A
![]() |
||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Algorithm Theory – SWAT 2008 [[electronic resource] ] : 11th Scandinavian Workshop on Algorithm Theory, Gothenburg, Sweden, July 2-4, 2008, Proceedings / / edited by Joachim Gudmundsson |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XIII, 438 p.) |
Disciplina | 005.73 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Data structures (Computer science)
Discrete mathematics Algorithms Computer communication systems Computer science—Mathematics Computer graphics Data Structures Discrete Mathematics Algorithm Analysis and Problem Complexity Computer Communication Networks Discrete Mathematics in Computer Science Computer Graphics |
ISBN | 3-540-69903-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Lectures -- A Survey of Results for Deletion Channels and Related Synchronization Channels -- Nash Bargaining Via Flexible Budget Markets -- Contributed Papers -- Simplified Planar Coresets for Data Streams -- Uniquely Represented Data Structures for Computational Geometry -- I/O Efficient Dynamic Data Structures for Longest Prefix Queries -- Guarding Art Galleries: The Extra Cost for Sculptures Is Linear -- Vision-Based Pursuit-Evasion in a Grid -- Angle Optimization in Target Tracking -- Improved Bounds for Wireless Localization -- Bicriteria Approximation Tradeoff for the Node-Cost Budget Problem -- Integer Maximum Flow in Wireless Sensor Networks with Energy Constraint -- The Maximum Energy-Constrained Dynamic Flow Problem -- Bounded Unpopularity Matchings -- Data Structures with Local Update Operations -- On the Redundancy of Succinct Data Structures -- Confluently Persistent Tries for Efficient Version Control -- A Uniform Approach Towards Succinct Representation of Trees -- An Algorithm for L(2,1)-Labeling of Trees -- Batch Coloring Flat Graphs and Thin -- Approximating the Interval Constrained Coloring Problem -- A Path Cover Technique for LCAs in Dags -- Boundary Labeling with Octilinear Leaders -- Distributed Disaster Disclosure -- Reoptimization of Steiner Trees -- On the Locality of Extracting a 2-Manifold in -- On Metric Clustering to Minimize the Sum of Radii -- On Covering Problems of Rado -- Packing Rectangles into 2OPT Bins Using Rotations -- A Preemptive Algorithm for Maximizing Disjoint Paths on Trees -- Minimum Distortion Embeddings into a Path of Bipartite Permutation and Threshold Graphs -- On a Special Co-cycle Basis of Graphs -- A Simple Linear Time Algorithm for the Isomorphism Problem on Proper Circular-Arc Graphs -- Spanners of Additively Weighted Point Sets -- The Kinetic Facility Location Problem -- Computing the Greedy Spanner in Near-Quadratic Time -- Parameterized Computational Complexity of Dodgson and Young Elections -- Online Compression Caching -- On Trade-Offs in External-Memory Diameter-Approximation. |
Record Nr. | UNINA-9910484732303321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|