The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Continue readingThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Continue readingThis book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October ...
Continue readingThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue readingThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Continue readingThis book treats the Mathematics of many important areas in digital information processing.It covers, in a unified presentation, ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Algorithmic Number Theory Symposium, ANTS 2006, held ...
Continue readingThis book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held ...
Continue readingHere are the refereed proceedings of the 6th Italian Conference on Algorithms and Computation, CIAC 2006. The 33 revised ...
Continue readingThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
Continue readingThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Symposium on Algorithms and Computation, ISAAC 2005, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Symposium on Algorithms and Computation, ISAAC 2006, ...
Continue readingThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
Continue readingAn Introduction to Number Theory provides an introduction to the main streams of number theory. Starting with the unique ...
Continue readingThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Continue readingAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
Continue readingAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms ...
Continue reading