Electronic Books

Total Books: 1 - 20 /26
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...

Weiterlesen
Advances in Cryptology - EUROCRYPT 2008 : 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings

Here are the refereed proceedings of the 27th Annual International Conference on the Theory and Applications of Cryptographic ...

Weiterlesen
Advances in Cryptology -- ASIACRYPT 2006

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology ...

Weiterlesen
Advances in Cryptology – ASIACRYPT 2005

This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...

Weiterlesen
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

Weiterlesen
Advances in Cryptology – ASIACRYPT 2007

The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...

Weiterlesen
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Weiterlesen
Cryptography and Coding

This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...

Weiterlesen
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

Weiterlesen
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Weiterlesen
Fast Software Encryption

It addresses all current aspects of fast and secure primitives for symmetric cryptology, covering hash function cryptanalysis ...

Weiterlesen
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

Weiterlesen
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

Weiterlesen
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

Weiterlesen
Fault Diagnosis and Tolerance in Cryptography

The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...

Weiterlesen
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Weiterlesen
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

Weiterlesen
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Weiterlesen
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Weiterlesen
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Weiterlesen
Total Books: 1 - 20 /26