Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
Weiterlesen
This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...
Weiterlesen
SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...
Weiterlesen
This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...
Weiterlesen
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Weiterlesen
This book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...
Weiterlesen
The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Weiterlesen
This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Weiterlesen
Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...
Weiterlesen