Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
These are the proceedings ofVIETCRYPT 2006, the ?rst international conf- ence on cryptology hosted in Vietnam. The conference was organized by FPT Software, in cooperation with Vietnam's Institute of Mathematics. It was held in the beautiful city of Hanoi, September 25-28, 2006. This conference would certainly not have been possible without Phan Dinh Dieu, the General Chair. I also wish to thank Nguyen Quoc Khanh, Nguyen Duy Lan and Phan Duong Hieu for their invaluable help in organizing the conference. TheProgramCommittee,consistingof36membersfrom17countries,cons- ered 78 papers (from 19 countries) and selected 24 for presentation. These p- ceedings include the revised versions of the 24 papers accepted by the Program Committee. These papers were selected from all the anonymous submissions to the conference on the basis of originality, quality and relevance to cryptography. Revisions were not checked and the authors bear full responsibility for the c- tents of their papers. The conference program also included two invited talks: it wasagreathonortohaveTatsuakiOkamotoandJacquesSternasinvitedspe- ers. Their talks were entitled, respectively, On Pairing-Based Cryptosystems and Cryptography in Financial Transactions: Current Practice and Future Directions. The selection of papers was a di?cult and challenging task. Each submission was reviewed by at least three referees. I wish to thank the ProgramCommittee members, who did an excellent job, and devoted much e?ort and valuable time to read and select the papers. In addition, I gratefully acknowledgethe help of a large number of colleagues who reviewed submissions in their areas of expertise.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.
Computer security --- Data encryption (Computer science) --- Computer networks --- Security measures --- Data encryption (Computer science). --- Computer software. --- Computer security. --- Cryptology. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software, Computer --- Protection --- Algorithms. --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Data encryption (Computer science) --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Electronic data processing --- Machine theory --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Protection --- Security measures --- Computer science—Mathematics. --- Algorism --- Algebra --- Arithmetic --- Foundations
Choose an application
The first book to offer a comprehensive view of the LLL algorithm, this text surveys computational aspects of Euclidean lattices and their main applications. It includes many detailed motivations, explanations and examples.
Cryptography -- Mathematics. --- Euclidean algorithm. --- Integer programming. --- Lattice theory. --- Cryptography --- Lattice theory --- Integer programming --- Euclidean algorithm --- Mathematics --- Engineering & Applied Sciences --- Physical Sciences & Mathematics --- Computer Science --- Mathematical Theory --- Algorithms. --- Mathematics. --- Algorithm of Euclid --- Continued division --- Division, Continued --- Euclid algorithm --- Euclidian algorithm --- Euclid's algorithm --- Lattices (Mathematics) --- Space lattice (Mathematics) --- Structural analysis (Mathematics) --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Algorism --- Computer science. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computer Science. --- Data Structures. --- Data Encryption. --- Mathematics of Computing. --- Data Structures, Cryptology and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algebra --- Arithmetic --- Foundations --- Algorithms --- Number theory --- Programming (Mathematics) --- Algebra, Abstract --- Algebra, Boolean --- Group theory --- Set theory --- Topology --- Transformations (Mathematics) --- Crystallography, Mathematical --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Computer software. --- Cryptology. --- Data Structures and Information Theory. --- Informatics --- Science --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Software, Computer --- Computer systems --- Computer science—Mathematics. --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Artificial intelligence --- Cryptography. --- Information theory. --- Data Science. --- Data processing. --- Communication theory --- Communication --- Cybernetics --- Computer mathematics
Choose an application
This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Artificial intelligence. --- Computers. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computer Systems Organization and Communication Networks. --- Computing Milieux. --- Artificial Intelligence (incl. Robotics). --- Coding and Information Theory. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- AI (Artificial intelligence) --- Artificial thinking --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Organization, Computer --- Informatics --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Protection --- Security measures --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Signal theory (Telecommunication) --- Computer programming --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Computer network architectures. --- Cryptology. --- Artificial Intelligence. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Information theory. --- Communication theory --- Communication --- Computer networks
Choose an application
This book constitutes the proceedings of the 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2013, held in Athens, Greece, in May 2013. The 41 full papers included in this volume were carefully reviewed and selected from 201 submissions. They deal with cryptanalysis of hash functions, side-channel attacks, number theory, lattices, public key encryption, digital signatures, homomorphic cryptography, quantum cryptography, storage, tools, and secure computation.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- computers --- informatica --- computerbeveiliging --- computerkunde
Choose an application
This book constitutes the proceedings of the 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2014, held in Copenhagen, Denmark, in May 2014. The 38 full papers included in this volume were carefully reviewed and selected from 197 submissions. They deal with public key cryptanalysis, identity-based encryption, key derivation and quantum computing, secret-key analysis and implementations, obfuscation and multi linear maps, authenticated encryption, symmetric encryption, multi-party encryption, side-channel attacks, signatures and public-key encryption, functional encryption, foundations and multi-party computation.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- computers --- informatica --- computerbeveiliging --- computerkunde
Choose an application
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- cryptografie --- discrete wiskunde --- complexe analyse (wiskunde) --- computers --- informatica --- externe fixatie (geneeskunde --- algoritmen --- computerbeveiliging --- informatica management --- computernetwerken --- computerkunde
Choose an application
These are the proceedings ofVIETCRYPT 2006, the ?rst international conf- ence on cryptology hosted in Vietnam. The conference was organized by FPT Software, in cooperation with Vietnam's Institute of Mathematics. It was held in the beautiful city of Hanoi, September 25-28, 2006. This conference would certainly not have been possible without Phan Dinh Dieu, the General Chair. I also wish to thank Nguyen Quoc Khanh, Nguyen Duy Lan and Phan Duong Hieu for their invaluable help in organizing the conference. TheProgramCommittee,consistingof36membersfrom17countries,cons- ered 78 papers (from 19 countries) and selected 24 for presentation. These p- ceedings include the revised versions of the 24 papers accepted by the Program Committee. These papers were selected from all the anonymous submissions to the conference on the basis of originality, quality and relevance to cryptography. Revisions were not checked and the authors bear full responsibility for the c- tents of their papers. The conference program also included two invited talks: it wasagreathonortohaveTatsuakiOkamotoandJacquesSternasinvitedspe- ers. Their talks were entitled, respectively, On Pairing-Based Cryptosystems and Cryptography in Financial Transactions: Current Practice and Future Directions. The selection of papers was a di?cult and challenging task. Each submission was reviewed by at least three referees. I wish to thank the ProgramCommittee members, who did an excellent job, and devoted much e?ort and valuable time to read and select the papers. In addition, I gratefully acknowledgethe help of a large number of colleagues who reviewed submissions in their areas of expertise.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
Complex analysis --- Mathematics --- Computer science --- Programming --- Information systems --- Computer. Automation --- cryptografie --- complexe analyse (wiskunde) --- informatica --- externe fixatie (geneeskunde --- database management --- informatietechnologie --- wiskunde --- programmatielogica --- algoritmen
Listing 1 - 10 of 14 | << page >> |
Sort by
|