Explore the latest books of this year!
Bookbot

Johannes Buchmann

    November 20, 1953
    Janda Manuelle Muskelfunktionsdiagnostik
    Post-quantum cryptography
    Coding theory, cryptography and related areas
    Binary quadratic forms
    Internet privacy
    Introduction to public key infrastructures
    • 2013

      The introduction of public key cryptography (PKC) marked a significant advancement in IT security, allowing confidential communication between entities in open networks, particularly the Internet, without prior contact. PKC facilitates unique protection techniques, notably digital signatures, which enhance Internet security by authenticating software downloads and updates. While PKC eliminates the need for prior key exchanges, effective management of private and public keys remains crucial: private keys must stay confidential, and public keys must be verifiably authentic. Therefore, understanding public key infrastructures (PKIs) that manage these key pairs is essential, alongside the mathematical principles of PKC. This book elucidates key concepts of PKIs, covering standards, implementations, and applications. It includes chapters on the motivation for PKI, certificates, trust models, private keys, revocation, validity models, certification service providers, certificate policies, certification paths, and practical PKI aspects. It serves as a textbook for advanced undergraduate and graduate courses in computer science, mathematics, engineering, and related fields, complementing introductory cryptography courses. With basic computer science prerequisites, the book features exercises in each chapter and solutions in an appendix, making it suitable for self-study and a valuable reference for researchers and practitioners in aca

      Introduction to public key infrastructures
    • 2012

      Das Internet ist eine der bedeutendsten technologischen Errungenschaften der Geschichte. Es erlaubt Menschen in aller Welt Zugang zu umfassenden Informationen, unterstützt die weltweite Kommunikation und Vernetzung und fungiert als globaler Marktplatz. Dabei bieten die vielfältigen Angebote im Internet jedoch nicht nur Chancen; sie werfen auch Fragen des Datenschutzes, der Persönlichkeitsentfaltung und der Privatsphäre auf. Dieses Phänomen wird gemeinhin als das Privatheitsparadoxon bezeichnet. Aufgrund der großen Bedeutung von Privatheit im Internet hat acatech 2011 ein Projekt initiiert, das sich mit dem Privatheitsparadoxon wissenschaftlich auseinandersetzt. Dieser Band ist der erste Teil einer acatech STUDIE zum Projekt „Internet Privacy – Eine Kultur der Privatsphäre und des Vertrauens im Internet“. Die Autoren leisten eine Bestandsaufnahme der existierenden individuellen und gesellschaftlichen Vorstellungen von Privatsphäre im Internet sowie der entsprechenden rechtlichen, technischen, ökonomischen und ethischen Rahmenbedingungen.

      Internet privacy
    • 2008

      Post-quantum cryptography

      • 229 pages
      • 9 hours of reading

      This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The 15 revised full papers presented were carefully reviewed and selected from numerous submissions. Quantum computers are predicted to break existing public key cryptosystems within the next decade. Post-quantum cryptography is a new fast developing area, where public key schemes are studied that could resist these emerging attacks. The papers present four families of public key cryptosystems that have the potential to resist quantum computers: the code-based public key cryptosystems, the hash-based public key cryptosystems, the lattice-based public key cryptosystems and the multivariate public key cryptosystems.

      Post-quantum cryptography
    • 2007

      Binary quadratic forms

      • 318 pages
      • 12 hours of reading

      This book explores algorithmic problems related to binary quadratic forms \( f(X, Y) = aX^2 + bXY + cY^2 \) with integer coefficients \( a, b, c \), the mathematical theories that address these issues, and their applications in cryptography. A significant portion of the theory is developed for forms with real coefficients, demonstrating that integer coefficient forms arise naturally. The evolution of number theory has been propelled by the exploration of concrete computational challenges, leading to the development of profound theories from the time of Euler and Gauss to the present. Algorithmic solutions and their properties have become a distinct area of study. The book intertwines classical strands of number theory with the presentation and analysis of both classical and modern algorithms that address these motivating problems. This algorithmic perspective aims to foster an understanding of both theory and solution methods, as well as an appreciation for the efficiency of these solutions. The computer age has significantly advanced algorithmic search capabilities, enabling the resolution of complex problems, such as Pell equations with large coefficients. Additionally, the role of number theory in public-key cryptography has heightened the importance of establishing the complexity of various computational problems, as the security of many computer systems relies on their intractability.

      Binary quadratic forms
    • 2001

      Introduction to cryptography

      • 296 pages
      • 11 hours of reading
      3.6(20)Add rating

      Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control and other such areas. Based on courses taught at Technical University in Darmstadt, Germany, this book explains the basic methods of modern cryptography.

      Introduction to cryptography
    • 2000

      A series of research papers on various aspects of coding theory, cryptography, and other areas, including new and unpublished results on the subjects. The book will be useful to students, researchers, professionals, and tutors interested in this area of research.

      Coding theory, cryptography and related areas