Listing 1 - 6 of 6 |
Sort by
|
Choose an application
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.
Computer security --- Data encryption (Computer science) --- Computer networks --- Security measures --- Data encryption (Computer science). --- Computer software. --- Computer security. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software, Computer --- Protection --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Data encryption (Computer science) --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Computer science—Mathematics. --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.
Cryptography -- Mathematics. --- Euclidean algorithm. --- Integer programming. --- Lattice theory. --- Cryptography --- Lattice theory --- Integer programming --- Euclidean algorithm --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Computer Science --- Mathematical Theory --- Algorithms. --- Mathematics. --- Algorithm of Euclid --- Continued division --- Division, Continued --- Euclid algorithm --- Euclidian algorithm --- Euclid's algorithm --- Lattices (Mathematics) --- Space lattice (Mathematics) --- Structural analysis (Mathematics) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Data Structures. --- Data Encryption. --- Mathematics of Computing. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algebra --- Arithmetic --- Foundations --- Algorithms --- Number theory --- Programming (Mathematics) --- Algebra, Abstract --- Algebra, Boolean --- Group theory --- Set theory --- Topology --- Transformations (Mathematics) --- Crystallography, Mathematical --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Computer software. --- Cryptology. --- Data Structures and Information Theory. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Software, Computer --- Computer systems --- Computer science—Mathematics. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Artificial intelligence --- Cryptography. --- Information theory. --- Data Science. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer mathematics
Choose an application
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Artificial intelligence. --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Artificial Intelligence (incl. Robotics). --- Coding and Information Theory. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Information theory. --- Communication theory --- Communication --- Computer networks
Choose an application
Computer security --- Cryptography --- Sécurité informatique --- Cryptographie --- Congresses. --- Congrès --- Computer systems --- Computer Science --- Engineering & Applied Sciences --- Access control --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Distributed processing --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer software. --- Computational complexity. --- Information Systems. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.
Choose an application
Computer security --- Computers --- Data encryption (Computer science) --- Public key cryptography --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Computer Science --- Access control --- Information Technology --- Computer Science (Hardware & Networks) --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Management of Computing and Information Systems. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Information Systems. --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics. --- Paris <2010>
Listing 1 - 6 of 6 |
Sort by
|