La lecture à portée de main
Vous pourrez modifier la taille du texte de cet ouvrage
Découvre YouScribe en t'inscrivant gratuitement
Je m'inscrisDécouvre YouScribe en t'inscrivant gratuitement
Je m'inscrisVous pourrez modifier la taille du texte de cet ouvrage
Description
Cryptography is concerned with the construction of schemes that withstand any abuse.
A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science.
This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.
Sujets
Informations
Publié par | Association for Computing Machinery and Morgan & Claypool Publishers |
Date de parution | 13 septembre 2019 |
Nombre de lectures | 0 |
EAN13 | 9781450372688 |
Langue | English |
Informations légales : prix de location à la page 0,3998€. Cette information est donnée uniquement à titre indicatif conformément à la législation en vigueur.
Extrait
Ebooks
On Monotonicity Testing and the 2-to-2 Games Conjecture
Dor Minzer
Ebooks
Informatique
On Monotonicity Testing and the 2-to-2 Games Conjecture
Dor Minzer
233 pages
English
Ebooks
From Algorithms to Thinking Machines
Talia Domenico
Ebooks
Informatique
From Algorithms to Thinking Machines
Talia Domenico
191 pages
English
Ebooks
Edmund Berkeley and the Social Responsibility of Computer Professionals
Bernadette Longo
Ebooks
Techniques
Edmund Berkeley and the Social Responsibility of Computer Professionals
Bernadette Longo
130 pages
English
Ebooks
Geospatial Data Science
Ebooks
Ada's Legacy
Robin Hammerman, Andrew L. Russell
Ebooks
Verified Functional Programming in Agda
Aaron Stump
Ebooks
Informatique
Verified Functional Programming in Agda
Aaron Stump
179 pages
English
Ebooks
Text Data Management and Analysis
ChengXiang Zhai, Sean Massung
Ebooks
Informatique
Text Data Management and Analysis
ChengXiang Zhai, Sean Massung
350 pages
English
Ebooks
Communities of Computing
Ebooks
Shared-Memory Parallelism Can be Simple, Fast, and Scalable
Julian Shun
Ebooks
Informatique
Shared-Memory Parallelism Can be Simple, Fast, and Scalable
Julian Shun
287 pages
English
Ebooks
Frontiers of Multimedia Research
Shih-Fu Chang
Ebooks
The Continuing Arms Race
Ebooks
Declarative Logic Programming
Michael Kifer, Yanhong Annie Liu
Ebooks
Informatique
Declarative Logic Programming
Michael Kifer, Yanhong Annie Liu
291 pages
English
Ebooks
Hardness of Approximation Between P and NP
Aviad Rubinstein
Ebooks
Informatique
Hardness of Approximation Between P and NP
Aviad Rubinstein
170 pages
English
Ebooks
Code Nation
Michael J. Halvorson
Ebooks
Software
Kim W. Tracy