The book offers a comprehensive exploration of complex Lie groups, emphasizing their structural aspects and unique concepts not found in other texts. It begins with foundational ideas before delving into the theory of representative functions and the extension problem of representations. Additionally, it discusses complex analytic groups and their relationship with affine algebraic groups. The author applies these insights to analyze the observability of subgroups within complex Lie groups, providing a systematic and in-depth treatment of the subject.
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012. The 26 revised full papers presented together with 8 short papers were carefully reviewed and selected from 100 submissions. The papers are focusing on all technical and practical aspects of symmetric cipher, secure hardware/public key crypto application, cryptographic protocols/digital forensics, network security, and trust management/database security.
This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.
ICISC 2009, the 12th International Conference on Information Security and Cryptology, took place in Seoul, Korea, from December 2–4, 2009. Organized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS), the conference aimed to present new research, development, and applications in information security and cryptology, while facilitating research information exchange. It received 88 submissions from 22 countries, encompassing all areas of the field. The review process was conducted in two stages by a Program Committee (PC) of 57 prominent researchers through online meetings. Initially, at least three PC members blind-reviewed each paper, with papers co-authored by PC members reviewed by at least five. Following this, individual review reports were shared, leading to detailed discussions on each submission. Ultimately, 25 papers from 15 countries were selected, resulting in an acceptance rate of 28.4%. Authors of the accepted papers had several weeks to refine their work based on feedback from over 80 external reviewers. The conference also included a tutorial by Amit Sahai from the University of California and an invited talk by Michel Abdalla from École normale supérieure.