Listing 1 - 10 of 34 | << page >> |
Sort by
|
Choose an application
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Data encryption (Computer science). --- Computer network architectures. --- Computer science. --- Computers --- Software engineering. --- Coding theory. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Software Engineering. --- Coding and Information Theory. --- Law and legislation. --- Computer organization. --- Computers and civilization. --- Computers. --- Information theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Organization, Computer --- Electronic digital computers --- Public key cryptography. --- Asymmetric cryptography --- Public key cryptosystems --- Public key encryption --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture
Choose an application
The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.
Data encryption (Computer science). --- Computer network architectures. --- Computer science. --- Computers --- Software engineering. --- Coding theory. --- Cryptology. --- Computer Systems Organization and Communication Networks. --- Computers and Society. --- Legal Aspects of Computing. --- Software Engineering. --- Coding and Information Theory. --- Law and legislation. --- Computer organization. --- Computers and civilization. --- Computers. --- Information theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Communication theory --- Communication --- Cybernetics --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Calculators --- Cyberspace --- Civilization and computers --- Civilization --- Organization, Computer --- Electronic digital computers --- Data encryption (Computer science)
Choose an application
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Coding theory. --- Information theory. --- Application software. --- User interfaces (Computer systems). --- Human-computer interaction. --- Data protection. --- Cryptology. --- Computer Communication Networks. --- Coding and Information Theory. --- Computer and Information Systems Applications. --- User Interfaces and Human Computer Interaction. --- Security Services. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer-human interaction --- Human factors in computing systems --- Interaction, Human-computer --- Human engineering --- User-centered system design --- User interfaces (Computer systems) --- Interfaces, User (Computer systems) --- Human-machine systems --- Human-computer interaction --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Distributed processing
Choose an application
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Computers, Special purpose. --- Computer systems. --- Coding theory. --- Information theory. --- Application software. --- Cryptology. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Computer System Implementation. --- Coding and Information Theory. --- Computer and Information Systems Applications. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Special purpose computers --- Computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Telecommunication --- Electronic data processing --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Distributed processing --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Cryptography. --- Data encryption (Computer science). --- Computer networks. --- Coding theory. --- Information theory. --- Computer engineering. --- Data protection. --- Computer networks—Security measures. --- Cryptology. --- Computer Communication Networks. --- Coding and Information Theory. --- Computer Engineering and Networks. --- Security Services. --- Mobile and Network Security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computers --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Design and construction --- Distributed processing --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
The four-volume proceedings LNCS 13791, 13792, 13793, and 13794 constitute the proceedings of the 28th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2022, held in Taipei, Taiwan, during December 5-9, 2022. The total of 98 full papers presented in these proceedings was carefully reviewed and selected from 364 submissions. The papers were organized in topical sections as follows: Part I: Award papers; functional and witness encryption; symmetric key cryptanalysis; multiparty computation; real world protocols; and blockchains and cryptocurrencies. Part II: Isogeny based cryptography; homomorphic encryption; NIZK and SNARKs; non interactive zero knowledge; and symmetric cryptography. Part III: Practical cryptography; advanced encryption; zero knowledge; quantum algorithms; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography.
Cryptography. --- Data encryption (Computer science). --- Numerical analysis. --- Computer networks. --- Computer systems. --- Coding theory. --- Information theory. --- Data protection. --- Cryptology. --- Numerical Analysis. --- Computer Communication Networks. --- Computer System Implementation. --- Coding and Information Theory. --- Security Services. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Communication theory --- Communication --- Cybernetics --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Information networks --- Telecommunication --- Network computers --- Mathematical analysis --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Distributed processing --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Information Security and Cryptology, Inscrypt 2014, held in Beijing, China, in December 2014. The 29 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on privacy and anonymity, multiparty and outsource computation, signature and security protocols, lattice and public key cryptography, block cipher and hash function, authentication and encryption, elliptic curve, and cryptographic primitive and application.
Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Coding theory. --- Computer software. --- Computational complexity. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Codage --- Logiciels --- Complexité de calcul (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Algorithms. --- Computer science --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Cryptology. --- Complexity, Computational --- Software, Computer --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics --- Cryptography. --- Discrete mathematics. --- Data and Information Security. --- Discrete mathematical structures --- Mathematical structures, Discrete --- Structures, Discrete mathematical --- Numerical analysis --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
This book constitutes the refereed proceedings of the 10th International Conference on Cryptology and Network Security, CANS 2011, held in Sanya, China, in December 2011. The 18 revised full papers, presented were carefully reviewed and selected from 65 submissions. The book also includes two invited talks. The papers are organized in topical sections on symmetric cryptanalysis, symmetric ciphers, public key cryptography, protocol attacks, and privacy techniques.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Computer science --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Discrete Mathematics in Computer Science. --- Coding and Information Theory. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Protection --- Security measures --- Distributed processing --- Computational complexity. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Complexity, Computational --- Computer science—Mathematics. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Mathematics --- Security measures --- Protection of computer systems --- Protection --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Foundations --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Software, Computer --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
Computer science. --- Computer communication systems. --- Software engineering. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Data Encryption. --- Computers and Society. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Civilization and computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Computer software engineering --- Informatics --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Security measures --- Protection of computer systems --- Protection --- Civilization --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Engineering --- Science --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing --- Cryptology. --- Data encryption (Computer science) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Listing 1 - 10 of 34 | << page >> |
Sort by
|