Improved Deterministic Algorithms for Weighted Matching and Packing Problems
TAMC '09 Proceedings of the 6th Annual Conference on Theory and Applications of Models of Computation
Data Is Key: Introducing the Data-Based Access Control Paradigm
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
One-counter Markov decision processes
SODA '10 Proceedings of the twenty-first annual ACM-SIAM symposium on Discrete Algorithms
Improved primitives for secure multiparty integer computation
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
On the equality of probabilistic terms
LPAR'10 Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning
Improved deterministic algorithms for weighted matching and packing problems
Theoretical Computer Science
Vector rational number reconstruction
Proceedings of the 36th international symposium on Symbolic and algebraic computation
Sharp lower bounds on the extractable randomness from non-uniform sources
Information and Computation
Symmetric functions capture general functions
MFCS'11 Proceedings of the 36th international conference on Mathematical foundations of computer science
Efficient lattice (H)IBE in the standard model
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Functional encryption for inner product predicates from learning with errors
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Verified indifferentiable hashing into elliptic curves
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Fast Polynomial Factorization and Modular Composition
SIAM Journal on Computing
Constant-Round multi-party private set union using reversed laurent series
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
TCC'13 Proceedings of the 10th theory of cryptography conference on Theory of Cryptography
Hardware acceleration of matrix multiplication over small prime finite fields
ARC'13 Proceedings of the 9th international conference on Reconfigurable Computing: architectures, tools, and applications
On Ideal Lattices and Learning with Errors over Rings
Journal of the ACM (JACM)
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Fast matrix decomposition in F2
Journal of Computational and Applied Mathematics
Lattice-based completely non-malleable public-key encryption in the standard model
Designs, Codes and Cryptography
Verified indifferentiable hashing into elliptic curves
Journal of Computer Security - Security and Trust Principles
Classical simulations of Abelian-group normalizer circuits with intermediate measurements
Quantum Information & Computation
Hi-index | 0.00 |
This introductory book emphasizes algorithms and applications, such as cryptography and error correcting codes, and is accessible to a broad audience. The presentation alternates between theory and applications in order to motivate and illustrate the mathematics. The mathematical coverage includes the basics of number theory, abstract algebra and discrete probability theory. This edition now includes over 150 new exercises, ranging from the routine to the challenging, that flesh out the material presented in the body of the text, and which further develop the theory and present new applications. The material has also been reorganized to improve clarity of exposition and presentation. Ideal as a textbook for introductory courses in number theory and algebra, especially those geared towards computer science students.