|
|
|
|
LEADER |
05065nmm a2200469 u 4500 |
001 |
EB002174701 |
003 |
EBX01000000000000001312478 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
230908 ||| eng |
020 |
|
|
|a 9781119879831
|
020 |
|
|
|a 1119879825
|
020 |
|
|
|a 9781119879824
|
020 |
|
|
|a 1119879833
|
050 |
|
4 |
|a QA76.9.M35
|
100 |
1 |
|
|a Ghosh, Sharmistha
|e editor
|
245 |
0 |
0 |
|a Mathematics and computer science, Volume 1
|c edited by Sharmistha Ghosh... [and 4 others]
|
260 |
|
|
|a Hoboken, NJ
|b John Wiley & Sons, Inc.
|c 2023
|
300 |
|
|
|a 557 p.
|
505 |
0 |
|
|a Chapter 2 Blow Up and Decay of Solutions for a Klein-Gordon Equation With Delay and Variable Exponents -- 2.1 Introduction -- 2.2 Preliminaries -- 2.3 Blow Up of Solutions -- 2.4 Decay of Solutions -- Acknowledgment -- References -- Chapter 3 Some New Inequalities Via Extended Generalized Fractional Integral Operator for Chebyshev Functional -- 3.1 Introduction -- 3.2 Preliminaries -- 3.3 Fractional Inequalities for the Chebyshev Functional -- 3.4 Fractional Inequalities in the Case of Extended Chebyshev Functional
|
505 |
0 |
|
|a 5.6 Algorithms Proposed During the NIST Standardization Procedure for Post-Quantum Cryptography -- 5.7 Hardware Requirements of Post-Quantum Cryptographic Algorithms -- 5.7.1 NTRUEncrypt -- 5.7.1.1 Polynomial Multiplication -- 5.7.1.2 Hardware to Accelerate NTRUEncrypt -- 5.7.2 Hardware-Software Design to Implement PCQ Algorithms -- 5.7.3 Implementation of Cryptographic Algorithms Using HLS -- 5.8 Challenges on the Way of Post-Quantum Cryptography -- 5.9 Post-Quantum Cryptography Versus Quantum Cryptography -- 5.10 Future Prospects of Post-Quantum Cryptography -- References
|
505 |
0 |
|
|a 5.3 Quantum Computing -- 5.3.1 The Main Aspects of Quantum Computing -- 5.3.2 Shor's Algorithm -- 5.3.3 Grover's Algorithm -- 5.3.4 The Need for Post-Quantum Cryptography -- 5.4 Algorithms Proposed for Post-Quantum Cryptography -- 5.4.1 Code-Based Cryptography -- 5.4.2 Lattice-Based Cryptography -- 5.4.3 Multivariate Cryptography -- 5.4.4 Hash-Based Cryptography -- 5.4.5 Supersingular Elliptic Curve Isogeny Cryptography -- 5.4.6 Quantum-Resistant Symmetric Key Cryptography -- 5.5 Launching of the Project Called "Open Quantum Safe"
|
505 |
0 |
|
|a 3.5 Some Other Fracional Inequalities Related to the Extended Chebyshev Functional -- 3.6 Concluding Remark -- References -- Chapter 4 Blow Up of the Higher-Order Kirchhoff-Type System With Logarithmic Nonlinearities -- 4.1 Introduction -- 4.2 Preliminaries -- 4.3 Blow Up for Problem for E (0) < d -- 4.4 Conclusion -- References -- Chapter 5 Developments in Post-Quantum Cryptography -- 5.1 Introduction -- 5.2 Modern-Day Cryptography -- 5.2.1 Symmetric Cryptosystems -- 5.2.2 Asymmetric Cryptosystems -- 5.2.3 Attacks on Modern Cryptosystems -- 5.2.3.1 Known Attacks -- 5.2.3.2 Side-Channel Attacks
|
653 |
|
|
|a Computer science / Mathematics / http://id.loc.gov/authorities/subjects/sh85042295
|
653 |
|
|
|a Informatique / Mathématiques
|
700 |
1 |
|
|a Niranjanamurthy, M.
|e editor
|
700 |
1 |
|
|a Deyasi, Krishanu
|e editor
|
700 |
1 |
|
|a Mallik, Biswadip Basu
|e editor
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Chapter 6 A Statistical Characterization of MCX Crude Oil Price with Regard to Persistence Behavior and Seasonal Anomaly
|
776 |
|
|
|z 1119879671
|
776 |
|
|
|z 9781119879671
|
776 |
|
|
|z 1119879825
|
776 |
|
|
|z 1119879833
|
776 |
|
|
|z 9781119879831
|
776 |
|
|
|z 9781119879824
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119879671/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 510
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 004.01/51
|
520 |
|
|
|a MATHEMATICS AND COMPUTER SCIENCE This first volume in a new multi-volume set gives readers the basic concepts and applications for diverse ideas and innovations in the field of computing together with its growing interactions with mathematics. This new edited volume from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas of mathematical sciences and computing. The chapters focus on recent advances in computer science, and mathematics, and where the two intersect to create value for end users through practical applications of the theory. The chapters herein cover scientific advancements across a diversified spectrum that includes differential as well as integral equations with applications, computational fluid dynamics, nanofluids, network theory and optimization, control theory, machine learning and artificial intelligence, big data analytics, Internet of Things, cryptography, fuzzy automata, statistics, and many more. Readers of this book will get access to diverse ideas and innovations in the field of computing together with its growing interactions in various fields of mathematics. Whether for the engineer, scientist, student, academic, or other industry professional, this is a must-have for any library
|