This book constitutes the proceedings of the 11th International Conference on the Theory and Application of Cryptology and ...
Lire la suite
The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suite
The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...
Lire la suite
Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...
Lire la suite
The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Lire la suite
This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
Lire la suite
Constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, ...
Lire la suite
This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...
Lire la suite