Listing 1 - 10 of 10 |
Sort by
|
Choose an application
Computer algorithms --- Cryptography --- Algorithmes --- Cryptographie --- Cryptography.
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009. The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.
Computers --- Data encryption (Computer science) --- Cryptography --- Computer Science --- Engineering & Applied Sciences --- Access control --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Coding and Information Theory. --- Computer Communication Networks. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Software, Computer --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Köln <2009>
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
Engineering & Applied Sciences --- Computer Science --- Computers --- Data encryption (Computer science) --- Access control --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Communication systems --- Mathematics --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Information Systems. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Computer science—Mathematics.
Choose an application
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Software, Computer --- Computer systems --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Data encryption (Computer science) --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
Ergodic theory. Information theory --- Complex analysis --- Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- coderen --- DES (data encryption standard) --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- computers --- informatica --- computerbeveiliging --- computerkunde --- informatietheorie
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009, held in Cologne, Germany, in April 2009. The 33 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 148 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications. The papers are organized in topical sections on security, proofs, and models, hash cryptanalysis, group and broadcast encryption, cryptosystems, cryptanalysis, side channels, curves, and randomness.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018. The 19 papers presented in this book were carefully reviewed and selected from 54 submissions. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Computer Hardware. --- Computer Communication Networks. --- Computing Milieux. --- Computer hardware. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Data encryption (Computer science)
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Listing 1 - 10 of 10 |
Sort by
|