Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
Continue readingEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
Continue readingThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Continue readingThis volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
Continue readingModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
Continue readingCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Continue readingCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Continue readingThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Continue readingConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
Continue readingThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Continue readingThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
Continue readingMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Continue readingMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Continue readingThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Continue readingConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Continue readingThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue readingThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Continue readingThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
Continue readingConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Continue reading