The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
WeiterlesenThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
WeiterlesenThis book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October ...
WeiterlesenThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
WeiterlesenThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
WeiterlesenThis book treats the Mathematics of many important areas in digital information processing.It covers, in a unified presentation, ...
WeiterlesenThis book constitutes the refereed proceedings of the 7th International Algorithmic Number Theory Symposium, ANTS 2006, held ...
WeiterlesenThis book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held ...
WeiterlesenHere are the refereed proceedings of the 6th Italian Conference on Algorithms and Computation, CIAC 2006. The 33 revised ...
WeiterlesenThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
WeiterlesenThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Symposium on Algorithms and Computation, ISAAC 2005, ...
WeiterlesenThis book constitutes the refereed proceedings of the 17th International Symposium on Algorithms and Computation, ISAAC 2006, ...
WeiterlesenThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
WeiterlesenAn Introduction to Number Theory provides an introduction to the main streams of number theory. Starting with the unique ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
WeiterlesenAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
WeiterlesenAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms ...
Weiterlesen