Narrow your search

Library

KU Leuven (6)

Odisee (6)

Thomas More Kempen (6)

Thomas More Mechelen (6)

UCLL (6)

ULB (6)

ULiège (6)

VIVES (6)

AP (5)

KDG (5)

More...

Resource type

book (10)

digital (5)


Language

English (14)


Year
From To Submit

2017 (1)

2014 (2)

2013 (2)

2010 (6)

2006 (3)

Listing 1 - 10 of 14 << page
of 2
>>
Sort by

Multi
Progress in Cryptology - VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
Author:
ISBN: 9783540688006 Year: 2006 Publisher: Berlin Heidelberg Springer-Verlag GmbH

Loading...
Export citation

Choose an application

Bookmark

Abstract

These are the proceedings ofVIETCRYPT 2006, the ?rst international conf- ence on cryptology hosted in Vietnam. The conference was organized by FPT Software, in cooperation with Vietnam's Institute of Mathematics. It was held in the beautiful city of Hanoi, September 25-28, 2006. This conference would certainly not have been possible without Phan Dinh Dieu, the General Chair. I also wish to thank Nguyen Quoc Khanh, Nguyen Duy Lan and Phan Duong Hieu for their invaluable help in organizing the conference. TheProgramCommittee,consistingof36membersfrom17countries,cons- ered 78 papers (from 19 countries) and selected 24 for presentation. These p- ceedings include the revised versions of the 24 papers accepted by the Program Committee. These papers were selected from all the anonymous submissions to the conference on the basis of originality, quality and relevance to cryptography. Revisions were not checked and the authors bear full responsibility for the c- tents of their papers. The conference program also included two invited talks: it wasagreathonortohaveTatsuakiOkamotoandJacquesSternasinvitedspe- ers. Their talks were entitled, respectively, On Pairing-Based Cryptosystems  and Cryptography in Financial Transactions: Current Practice and Future Directions.  The selection of papers was a di?cult and challenging task. Each submission was reviewed by at least three referees. I wish to thank the ProgramCommittee members, who did an excellent job, and devoted much e?ort and valuable time to read and select the papers. In addition, I gratefully acknowledgethe help of a large number of colleagues who reviewed submissions in their areas of expertise.


Book
Advances in Cryptology – EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014, Proceedings
Authors: ---
ISBN: 364255220X 3642552196 Year: 2014 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.


Book
Advances in Cryptology – EUROCRYPT 2013 : 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013, Proceedings
Authors: ---
ISBN: 3642383475 3642383483 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.


Book
The LLL algorithm : survey and applications
Authors: ---
ISBN: 3642022944 9786612836398 1282836390 3642022952 Year: 2010 Publisher: Heidelberg : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.

Keywords

Cryptography -- Mathematics. --- Euclidean algorithm. --- Integer programming. --- Lattice theory. --- Cryptography --- Lattice theory --- Integer programming --- Euclidean algorithm --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Computer Science --- Mathematical Theory --- Algorithms. --- Mathematics. --- Algorithm of Euclid --- Continued division --- Division, Continued --- Euclid algorithm --- Euclidian algorithm --- Euclid's algorithm --- Lattices (Mathematics) --- Space lattice (Mathematics) --- Structural analysis (Mathematics) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Data Structures. --- Data Encryption. --- Mathematics of Computing. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algebra --- Arithmetic --- Foundations --- Algorithms --- Number theory --- Programming (Mathematics) --- Algebra, Abstract --- Algebra, Boolean --- Group theory --- Set theory --- Topology --- Transformations (Mathematics) --- Crystallography, Mathematical --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Computer software. --- Cryptology. --- Data Structures and Information Theory. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Software, Computer --- Computer systems --- Computer science—Mathematics. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Artificial intelligence --- Cryptography. --- Information theory. --- Data Science. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer mathematics


Book
Information Security : 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings
Authors: ---
ISBN: 3319696599 3319696580 Year: 2017 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017.  The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Keywords

Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Artificial intelligence. --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Artificial Intelligence (incl. Robotics). --- Coding and Information Theory. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Information theory. --- Communication theory --- Communication --- Computer networks


Digital
Advances in Cryptology – EUROCRYPT 2013 : 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings
Authors: ---
ISBN: 9783642383489 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.


Digital
Advances in Cryptology – EUROCRYPT 2014 : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings
Authors: ---
ISBN: 9783642552205 Year: 2014 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.


Digital
Public Key Cryptography - PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings
Authors: ---
ISBN: 9783642130137 9783642130120 9783642130144 Year: 2010 Publisher: Berlin, Heidelberg Springer


Book
Progress in Cryptology - VIETCRYPT 2006 : First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006. Revised Selected Papers
Authors: ---
ISBN: 9783540688006 Year: 2006 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

These are the proceedings ofVIETCRYPT 2006, the ?rst international conf- ence on cryptology hosted in Vietnam. The conference was organized by FPT Software, in cooperation with Vietnam's Institute of Mathematics. It was held in the beautiful city of Hanoi, September 25-28, 2006. This conference would certainly not have been possible without Phan Dinh Dieu, the General Chair. I also wish to thank Nguyen Quoc Khanh, Nguyen Duy Lan and Phan Duong Hieu for their invaluable help in organizing the conference. TheProgramCommittee,consistingof36membersfrom17countries,cons- ered 78 papers (from 19 countries) and selected 24 for presentation. These p- ceedings include the revised versions of the 24 papers accepted by the Program Committee. These papers were selected from all the anonymous submissions to the conference on the basis of originality, quality and relevance to cryptography. Revisions were not checked and the authors bear full responsibility for the c- tents of their papers. The conference program also included two invited talks: it wasagreathonortohaveTatsuakiOkamotoandJacquesSternasinvitedspe- ers. Their talks were entitled, respectively, On Pairing-Based Cryptosystems  and Cryptography in Financial Transactions: Current Practice and Future Directions.  The selection of papers was a di?cult and challenging task. Each submission was reviewed by at least three referees. I wish to thank the ProgramCommittee members, who did an excellent job, and devoted much e?ort and valuable time to read and select the papers. In addition, I gratefully acknowledgethe help of a large number of colleagues who reviewed submissions in their areas of expertise.


Digital
The LLL Algorithm : Survey and Applications
Authors: ---
ISBN: 9783642022951 9783642022968 9783642022944 9783642261640 Year: 2010 Publisher: Berlin, Heidelberg Springer

Listing 1 - 10 of 14 << page
of 2
>>
Sort by