ICIAM '87


Book Description







Secret Key Cryptography


Book Description

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before. About the technology From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology! About the book Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging. What's inside Construct 30 unbreakable ciphers Measure the strength of your ciphers and guarantee their security Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers of the future About the reader For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required. About the author Frank Rubin has been doing cryptography for over 50 years. He holds an MS in Mathematics, and a PhD in Computer Science. Table of Contents 1 Introduction 2 What is cryptography? 3 Preliminary concepts 4 Cryptographer’s toolbox 5 Substitution ciphers 6 Countermeasures 7 Transposition 8 Jefferson Wheel Cypher 9 Fractionation 10 Variable-length fractionation 11 Block ciphers 12 Principles for secure encryption 13 Stream ciphers 14 One-time pad 15 Matrix methods 16 Three pass protocol 17 Codes 18 Quantum computers




Monte Carlo Methods


Book Description

This introduction to Monte Carlo methods seeks to identify and study the unifying elements that underlie their effective application. Initial chapters provide a short treatment of the probability and statistics needed as background, enabling those without experience in Monte Carlo techniques to apply these ideas to their research. The book focuses on two basic themes: The first is the importance of random walks as they occur both in natural stochastic systems and in their relationship to integral and differential equations. The second theme is that of variance reduction in general and importance sampling in particular as a technique for efficient use of the methods. Random walks are introduced with an elementary example in which the modeling of radiation transport arises directly from a schematic probabilistic description of the interaction of radiation with matter. Building on this example, the relationship between random walks and integral equations is outlined. The applicability of these ideas to other problems is shown by a clear and elementary introduction to the solution of the Schrödinger equation by random walks. The text includes sample problems that readers can solve by themselves to illustrate the content of each chapter. This is the second, completely revised and extended edition of the successful monograph, which brings the treatment up to date and incorporates the many advances in Monte Carlo techniques and their applications, while retaining the original elementary but general approach.







Proceedings of the Statistical Computing Section


Book Description

Papers presented at the annual meeting of the American Statistical Association ...










Random Number Generators for Ultracomputers


Book Description

This is a comprehensive guide to the theory and practice of generating random numbers for ultracomputers. The authors cover all aspects of random number generation, from basic algorithms to advanced techniques for improving randomness and reducing correlation. This book is essential reading for anyone working with ultracomputers or interested in the theory of random number generation. This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work is in the "public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.




Computer Performance Evaluation '92


Book Description