Zero-knowledge interactive proofsystems are a new technique which can be used as a cryptographic tool for designing provably ...
Lire la suiteEurocrypt is a conference devoted to all aspects of cryptologic research, both theoretical and practical, sponsored by the ...
Lire la suiteThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Lire la suiteThis volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...
Lire la suiteModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteCryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...
Lire la suiteThis book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...
Lire la suiteConstitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...
Lire la suiteThe 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...
Lire la suiteThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
Lire la suiteMultimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking ...
Lire la suiteMultivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes ...
Lire la suiteThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Lire la suiteConstitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...
Lire la suiteThis book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Lire la suiteThe papers in this volume represent the proceedings of the VIETCRYPT2006, the first international confer-ence on cryptology ...
Lire la suiteThis book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...
Lire la suiteConstitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Lire la suite