The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Continue readingThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Continue reading