The book are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast ...
Lire la suiteThis book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have ...
Lire la suiteThis book contains a selection of the best papers given at the international Advanced Computer Systems Conference in October ...
Lire la suiteThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Lire la suiteThe book is organized in topical sections on Software and Multimedia security, Public-key cryptography, Network security, ...
Lire la suiteThis book constitutes the refereed proceedings of the 16th International Workshop on Security, IWSEC 2021, held in Tokyo, ...
Lire la suiteThis book treats the Mathematics of many important areas in digital information processing.It covers, in a unified presentation, ...
Lire la suiteThis book constitutes the refereed proceedings of the 7th International Algorithmic Number Theory Symposium, ANTS 2006, held ...
Lire la suiteThis book constitutes the refereed proceedings of the 8th International Algorithmic Number Theory Symposium, ANTS 2008, held ...
Lire la suiteHere are the refereed proceedings of the 6th Italian Conference on Algorithms and Computation, CIAC 2006. The 33 revised ...
Lire la suiteThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
Lire la suiteThis book presented algorithms and data structures, online algorithms, approximation algorithm, graphs, computational geometry, ...
Lire la suiteThis book constitutes the refereed proceedings of the 16th International Symposium on Algorithms and Computation, ISAAC 2005, ...
Lire la suiteThis book constitutes the refereed proceedings of the 17th International Symposium on Algorithms and Computation, ISAAC 2006, ...
Lire la suiteThis self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems ...
Lire la suiteAn Introduction to Number Theory provides an introduction to the main streams of number theory. Starting with the unique ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information ...
Lire la suiteAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
Lire la suiteAmong the subjects addressed are block codes, including list-decoding algorithms; algebra and codes: rings, fields, algebraic ...
Lire la suiteThis book constitutes the refereed proceedings of the 16th International Symposium on Applied Algebra, Algebraic Algorithms ...
Lire la suite