A Secret Shared


Book Description

Newbery Medal–winning author Patricia MacLachlan paints a moving portrait of what it means to be a family, the power of love, and the importance of bringing the truth out into the light, in this beautiful and profound story about adoption. Nora and Ben’s younger sister Birdy loves to keep secrets. She surprises her family more than once: She hides a kitten in her room. She writes a beautiful poem. One day Birdy watches her mother spit into a tube, ready to send it off to find out more about herself and where her family came from. Birdy spits into a tube, too, when no one sees her. But when the test results come back, they are a surprise. Birdy is seemingly not related to Nora and Ben’s parents. But if she is adopted, how could that have happened without the children knowing? Nora and Ben must learn when to keep a secret, and who to go to for help—and eventually, how to solve this secret for the entire family.




A Secret Shared...


Book Description

Is a secret halved…? High-flying oncologist professor Jack Kincaid isn't convinced by the treatment offered at Dolphin Bay Healing Resort. But if there's the slightest possibility that dolphins can help his little nephew Harry, he needs to give it a chance! Especially when he recognizes beautiful therapist Dr. Kate Martin—the woman he once knew as Cathy! Jack can't help but be intrigued, and he's just as attracted to her as he always was. And when Kate reveals to him the devastating secret that she will do anything to escape, not only does she share her burden, but she starts to open up Jack's locked-away heart, too….




An Introduction to Secret Sharing


Book Description

This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.




Cryptography: Policy and Algorithms


Book Description

This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.




Advances in Information and Computer Security


Book Description

This book constitutes the refereed proceedings of the 9th International Workshop on Security, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The 13 regular papers presented together with 8 short papers in this volume were carefully reviewed and selected from 55 submissions. The focus of the workshop was on the following topics: system security, threshold cryptography, hardware security, foundation, and encryption.




Proceedings of International Conference on Frontiers in Computing and Systems


Book Description

This book gathers outstanding research papers presented at the International Conference on Frontiers in Computing and Systems (COMSYS 2020), held on January 13–15, 2019 at Jalpaiguri Government Engineering College, West Bengal, India and jointly organized by the Department of Computer Science & Engineering and Department of Electronics & Communication Engineering. The book presents the latest research and results in various fields of machine learning, computational intelligence, VLSI, networks and systems, computational biology, and security, making it a rich source of reference material for academia and industry alike.




Progress in Cryptology -- INDOCRYPT 2003


Book Description

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003. The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and authentication.




A Cryptography Primer


Book Description

This accessible introduction for undergraduates explains the cryptographic protocols for privacy and the use of digital signatures for certifying the integrity of messages and programs. It provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.




Theory of Cryptography


Book Description

The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016. The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.




Advances in Pure and Applied Algebra


Book Description

This proceedings volume documents the contributions presented at the CONIAPS XXVII International Conference on Recent Advances in Pure and Applied Algebra. The entries focus on modern trends and techniques in various branches of pure and applied Algebra and highlight their applications in coding, cryptography, graph, and fuzzy theory. The book comprised a total of eighteen chapters, among which the first fourteen chapters are devoted to Algebra and related topics, and the last four chapters are included applied mathematics parts. The chapters present the latest research work being done on the frontiers of the various branches of algebra as well as showcase the cross-fertilization of the ideas and connection among these branches.Covering a broad range of topics in pure and applied Algebra, this volume would appeal to a wide spectrum of the researcher in Mathematics. The main aim of this monograph is to contribute to the development of pure and applied Algebra and hence we purposely sought a cross-section of topics in Algebra and encouraged expository presentations and research papers that provide an innovative link between research areas of Algebra and the field of their applications. This volume will be useful not only to experts but also to beginners of research in algebras and related topics.