This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
Extending the ideas of the acclaimed first edition, new material has been adeed to render an even more accessible textbook for course usage. This edition includes new discussions of the Radon transform, the Dirac delta function and its role in X-ray imaging, Kacmarz’s method and least squares approximation, spectral filtering, and more. Copious examples and exercises, new computer-based exerc…
This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with know…
This book constitutes the thoroughly refereed conference proceedings of the 9th International Workshop on Algorithms and Computation, WALCOM 2015, held in Dhaka, Bangladesh, in February 2015. The 26 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on approximation algorithms, data s…
This book focuses on recent research in modern optimization and its implications in control and data analysis. This book is a collection of papers from the conference “Optimization and Its Applications in Control and Data Science” dedicated to Professor Boris T. Polyak, which was held in Moscow, Russia on May 13-15, 2015. This book reflects developments in theory and applications roo…
This book covers the latest advances in playful user interfaces – interfaces that invite social and physical interaction. These new developments include the use of audio, visual, tactile and physiological sensors to monitor, provide feedback and anticipate the behavior of human users. The decreasing cost of sensor and actuator technology makes it possible to integrate physical behavior inform…
The calculation of channel capacities was one of Rudolf Ahlswede's specialties and is the main topic of this second volume of his Lectures on Information Theory. Here we find a detailed account of some very classical material from the early days of Information Theory, including developments from the USA, Russia, Hungary and (which Ahlswede was probably in a unique position to describe) the Germ…
This book is a collection of the miscellaneous knowledge essential for transistor-level LSI circuit design, summarized as the issues that need to be considered in each design step. To design an LSI that actually functions and to be able to properly measure it, an extremely large amount of diverse, detailed knowledge is necessary. Even though one may read a textbook about an op-amp, for example,…
This book explores the life and scientific legacy of Manfred Schroeder through personal reflections, scientific essays and Schroeder’s own memoirs. Reflecting the wide range of Schroeder’s activities, the first part of the book contains thirteen articles written by his colleagues and former students. Topics discussed include his early, pioneering contributions to the understanding of statis…
This book presents the basics of quantum information, e.g., foundation of quantum theory, quantum algorithms, quantum entanglement, quantum entropies, quantum coding, quantum error correction and quantum cryptography. The required knowledge is only elementary calculus and linear algebra. This way the book can be understood by undergraduate students. In order to study quantum information, one us…