The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Lire la suite