The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Lee masThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Lee mas