The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Continue readingThe two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography ...
Continue readingThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue readingThis two-volume set of LNCS 12146 and 12147 constitutes the refereed proceedings of the 18th International Conference on ...
Continue readingThe 3rd International Conference on Applied Cryptography and Network Security (ACNS 2005) was sponsored and organized by ...
Continue readingThe 4th International Conference on Applied Cryptography and Network Security(ACNS 2006)washeldin Singapore,during June6-9,2006.ACNS ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...
Continue readingThis book constitutes the proceedings of the satellite workshops held around the 18th International Conference on Applied ...
Continue readingThis book constitutes the refereed proceedings of the 21st International Conference on Architecture of Computing Systems, ...
Continue readingThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Continue readingThis book presented structures in finite fields, efficient implementation and architectures, efficient finite field arithmetic, ...
Continue readingThis book constitutes the thoroughly refereed post-workshop proceedings of the 8th International Workshop on the Arithmetic ...
Continue readingThis book constitutes the refereed proceedings of the Second International Workshop on the Arithmetic of Finite Fields, WAIFI ...
Continue readingThe basic techniques of algebra and number theory useful in recent applications to cryptography and codes are developed, ...
Continue readingThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Continue readingThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Continue readingThe 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th International Conference on Artificial ...
Continue readingThe two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, ...
Continue readingThis book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
Continue reading