WorldCat Identities

Smart, Nigel P. (Nigel Paul) 1967-

Overview
Works: 66 works in 210 publications in 3 languages and 5,644 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor, Other
Classifications: QA76.9.A25, 005.82
Publication Timeline
.
Most widely held works about Nigel P Smart
 
Most widely held works by Nigel P Smart
Elliptic curves in cryptography by Ian F Blake( )

23 editions published between 1999 and 2006 in 3 languages and held by 1,218 WorldCat member libraries worldwide

Elliptic curve cryptography is a major challenger to the dominant RSA/DSA systems, with increased speed, less memory required and smaller key sizes. This book summarises knowledge built up within Hewlett Packard over a number of years
The algorithmic resolution of diophantine equations by Nigel P Smart( )

15 editions published in 1998 in English and held by 1,051 WorldCat member libraries worldwide

Beginning with a brief introduction to algorithms and diophantine equations, this volume aims to provide a coherent account of the methods used to find all the solutions to certain diophantine equations, particularly those procedures which have been developed for use on a computer. The study is divided into three parts, the emphasis throughout being on examining approaches with a wide range of applications. The first section considers basic techniques including local methods, sieving, descent arguments and the LLL algorithm. The second section explores problems which can be solved using Baker's theory of linear forms in logarithms. The final section looks at problems associated with curves, mainly focusing on rational and integral points on elliptic curves. Each chapter concludes with a useful set of exercises. A detailed bibliography is included. This book will appeal to graduate students and research workers, with a basic knowledge of number theory, who are interested in solving diophantine equations using computational methods
Advances in elliptic curve cryptography( )

15 editions published between 2004 and 2007 in English and Undetermined and held by 631 WorldCat member libraries worldwide

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research literature in these areas have provided articles that reflect the current state of these important topics
Cryptography and coding : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings by Nigel P Smart( )

16 editions published in 2005 in English and held by 589 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, UK, in December 2005. The 26 revised full papers presented together with 4 invited contributions were carefully reviewed and selected from 94 submissions. The papers are organized in topical sections on coding theory, signatures and signcryption, symmetric cryptography, side channels, algebraic cryptanalysis, information theoretic applications, number theoretic foundations, and public key and ID-based encryption schemes
Advances in cryptology -- EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedings by Nigel P Smart( )

17 editions published in 2008 in English and held by 572 WorldCat member libraries worldwide

These are the proceedings of Eurocrypt 2008, the 27th Annual IACR Eu- crypt Conference. The conference was sponsored by the International Asso- ation for Cryptologic Research (www.iacr.org), this year in cooperation with Tubitak (www.tubitak.gov.tr). The Eurocrypt 2008 Program Committee (PC) consisted of 28 members whose names are listed on the next page. There were 163 papers submitted to the conference and the PC chose 31 of them. Each paper was assigned to at least three PC members, who either handled it themselves or assigned it to an external referee. After the reviews were submitted, the committee deliberated both online for severalweeks and?nally ina face-to-facemeetingheldinBristol. Papers were refereed anonymously, with PC papers having a minimum of ?ve reviewers. All of our deliberations were aided by theWeb Submission and- viewSoftware written and maintainedby Shai Halevi. In addition to noti?cation of the decision of the committee, authors received reviews; the default for any report given to the committee was that it should be available to the authors as well
What is computer science? : an information security perspective by Daniel Stephen Page( )

9 editions published in 2014 in English and held by 412 WorldCat member libraries worldwide

The remarkable diversity of ideas within the subject of computer science makes it highly rewarding and exciting to study, yet also difficult to describe in essence. This engaging and accessible text addresses the fundamental question: What Is Computer Science? Rather than supplying a brief overview of every relevant topic, the book showcases a set of representative concepts broadly connected by the theme of information security. The presentation of each topic can be treated as a "mini" lecture course, demonstrating how it allows us to solve real problems, as well as how it relates to other subjects. The discussions are further supported by numerous examples and practical hands-on exercises, which together will be sure to whet your appetite for the many fascinating aspects of computer science. Topics and features: Presents a concise introduction to the study of algorithms, and describes how computers work using the example of computer viruses Introduces the concepts of data compression, and error detection and correction Highlights the role of data structures, and how their design can have a profound influence on algorithms that operate on them Explores the topic of web-search, with a specific focus on examples drawn from cryptography and information security Reviews both historic and modern cryptographic schemes, examines how a physical system can leak information, and discusses the idea of randomness Investigates the science of steganography, the hiding of secret data within non-secret data Provides additional supplementary material at an associated website This easy-to-read textbook is an ideal introduction to the study of computer science for students beginning on, or contemplating taking, an undergraduate degree. Teachers wishing to offer a primer on the field will also find the book an excellent educational resource
Cryptography made simple by Nigel P Smart( )

17 editions published between 2015 and 2016 in English and held by 378 WorldCat member libraries worldwide

In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what is meant by "secure" is as important as creating something that achieves that goal, and security definitions are central to the discussion throughout. The chapters in Part 1 offer a brief introduction to the mathematical foundations: modular arithmetic, groups, finite fields, and probability; primality testing and factoring; discrete logarithms; elliptic curves; and lattices. Part 2 of the book shows how historical ciphers were broken, thus motivating the design of modern cryptosystems since the 1960s; this part also includes a chapter on information-theoretic security. Part 3 covers the core aspects of modern cryptography: the definition of security; modern stream ciphers; block ciphers and modes of operation; hash functions, message authentication codes, and key derivation functions; the "naive" RSA algorithm; public key encryption and signature algorithms; cryptography based on computational complexity; and certificates, key transport and key agreement. Finally, Part 4 addresses advanced prot ocols, where the parties may have different or even conflicting security goals: secret sharing schemes; commitments and oblivious transfer; zero-knowledge proofs; and secure multi-party computation. The author balances a largely non-rigorous style -- many proofs are sketched only -- with appropriate formality and depth. For example, he uses the terminology of groups and finite fields so that the reader can understand both the latest academic research and "real-world" documents such as application programming interface descriptions and cryptographic standards. The text employs colour to distinguish between public and private information, and all chapters include summaries and suggestions for further reading. This is a suitabletextbook for advanced undergraduate and graduate students in computer science, mathematics and engine
Progress in Cryptology -- INDOCRYPT 2017 : 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings by International Conference in Cryptology in India( )

9 editions published in 2017 in English and held by 288 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions
Topics in cryptology - CT-RSA 2018 : the Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, proceedings by CT-RSA( )

7 editions published in 2018 in English and held by 249 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2018, CT-RSA 2018, held in San Francisco, CA, USA, in March 2018. The 26 papers presented in this volume were carefully reviewed and selected from 79 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security
Cryptography : an introduction by Nigel P Smart( Book )

7 editions published between 2002 and 2003 in English and held by 100 WorldCat member libraries worldwide

Australian apprenticeships : research readings by Nigel P Smart( Book )

3 editions published in 2001 in English and held by 22 WorldCat member libraries worldwide

Cryptography and coding : proceedings( )

2 editions published in 2005 in English and held by 22 WorldCat member libraries worldwide

The algorithmic resolution of diophantine equations : a computational cookbook by Nigel P Smart( )

3 editions published in 1998 in English and held by 14 WorldCat member libraries worldwide

XIV. 4. Integral points on hyperelliptic and superelliptic curves
Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings by Nigel P Smart( )

2 editions published in 2005 in Undetermined and English and held by 14 WorldCat member libraries worldwide

Advances in Elliptic Curve Cryptography by Ian F Blake( )

1 edition published in 2005 in English and held by 7 WorldCat member libraries worldwide

Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic protocols that hold great promise. Notions such as provable security, side channel analysis and the Weil descent technique have also grown in importance. This second volume addresses these advances and brings the reader up to date. Prominent contributors to the research li
Arithmetic on superelliptic curves by Steven D Galbraith( Book )

3 editions published in 1998 in English and held by 4 WorldCat member libraries worldwide

The solution of triangularly connected decomposable form equations by Nigel P Smart( Book )

1 edition published in 1993 in English and held by 3 WorldCat member libraries worldwide

Advances in Cryptology EUROCRYPT 2008 00 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings( )

1 edition published in 2008 in English and held by 3 WorldCat member libraries worldwide

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2008. The 31 revised full papers presented were carefully reviewed and selected from 163 submissions
Lean biomanufacturing by Nigel P Smart( )

3 editions published between 2012 and 2013 in English and held by 3 WorldCat member libraries worldwide

With decreasing profit margins, increasing cost pressures, growing regulatory compliance concerns, mounting pressure from generic drugs and increasing anxiety about the future of healthcare reimbursement, pharmaceutical manufacturers are now forced to re-examine and re-assess the way they have been doing things. In order to sustain profitability, these companies are looking to reduce waste (of all kinds), improve efficiency and increase productivity. Many of them are taking a closer look at lean manufacturing as a way to achieve these goals. Lean biomanufacturing re-visits lean principles and then applies them sympathetically - in a highly practical approach - to the specific needs of pharmaceutical processes, which present significantly different challenges to more mainstream manufacturing processes. A major goal of the book is to highlight those problems and issues that appear more specific or unique to biopharmaceutical manufacturing situations and to provide some insights into what challenges are the important ones to solve and what techniques, tools and mechanisms to employ to be successful. Following an introduction to lean biomanufacturing, the book goes on to discuss lean technologies and methods applied in biomanufacturing. Later chapters cover the creation and implementation of the Transition Plan, issues facing the biopharmaceutical industry, creating a lean approach towards biopharmaceutical processes and the contribution of simulation models in developing these processes. The final chapter covers examples of new technology innovations which help facilitate lean biomanufacturing. A focus on the issues associated with the application of lean principles to biomanufacturing Practical examples of factors which can affect biopharmaceutical processes Coverage of key factors which require integration to run an efficient biopharmaceutical process
Daen kyokusen angō( Book )

2 editions published in 2001 in Japanese and held by 3 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.37 (from 0.13 for The algori ... to 0.92 for Cryptograp ...)

Advances in elliptic curve cryptography
Covers
The algorithmic resolution of diophantine equationsAdvances in elliptic curve cryptographyCryptography and coding : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedingsAdvances in cryptology -- EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008 : proceedingsCryptography : an introductionCryptography and coding : proceedingsThe algorithmic resolution of diophantine equations : a computational cookbookLean biomanufacturing
Alternative Names
Nigel Smart britischer Mathematiker

Nigel Smart British cryptographer

Nigel Smart Brits cryptograaf

Nigel Smart mathématicien britannique

Smart, N.

Smart, N. 1967-

Smart, N. P.

Smart, N. P. 1967-

Smart, N. P. (Nigel Paul), 1967-

Smart, Nigel.

Smart, Nigel 1967-

Smart, Nigel P.

Smart, Nigel Paul

Smart, Nigel Paul 1967-

نايجل سمارت

スマート, ナイジェル・P

Languages