Narrow your search

Library

KU Leuven (12)

Odisee (12)

Thomas More Kempen (12)

Thomas More Mechelen (12)

UCLL (12)

ULB (12)

ULiège (12)

VIVES (12)

VUB (12)

AP (6)

More...

Resource type

book (24)

digital (6)


Language

English (27)


Year
From To Submit

2021 (6)

2019 (8)

2018 (1)

2016 (1)

2013 (4)

More...
Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Book
Topics in Cryptology - CT-RSA 2016 : The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings
Author:
ISBN: 3319294849 3319294857 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

Keywords

Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computer Communication Networks. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Foundations --- Protection --- Security measures --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Information theory. --- Communication theory --- Communication --- Cybernetics


Book
Advances in Cryptology -- ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
Authors: ---
ISBN: 3642420443 3642420451 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Keywords

Computer science. --- Data encryption (Computer science) --- Data protection. --- Computer software. --- Computational complexity. --- Information Systems. --- Mathematics. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Engineering & Applied Sciences --- Computer Science --- Math --- Complexity, Computational --- Software, Computer --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Computer security --- Cryptology. --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Machine theory --- Cryptography --- Protection --- Security measures --- Computer science—Mathematics. --- Engineering --- Engineering analysis --- Mathematical analysis --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Mathematics --- Communication systems --- Foundations


Book
Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
Authors: ---
ISBN: 364242032X 3642420338 Year: 2013 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Keywords

Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Computational complexity. --- Information Systems. --- Mathematics. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Engineering & Applied Sciences --- Computer Science --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Math --- Complexity, Computational --- Software, Computer --- Computer security. --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer security --- Data encryption (Computer science) --- Cryptology. --- Computer systems --- Cryptography --- Science --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Machine theory --- Protection --- Security measures --- Computer science—Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Engineering --- Engineering analysis --- Mathematical analysis --- Communication systems --- Foundations --- Mathematics


Book
Public-Key Cryptography – PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II
Authors: ---
ISBN: 3030172597 3030172589 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.


Book
Public-Key Cryptography – PKC 2019 : 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I
Authors: ---
ISBN: 3030172538 303017252X Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.


Book
Financial Cryptography and Data Security : 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 – March 2, 2018, Revised Selected Papers
Authors: ---
ISBN: 3662583879 3662583860 Year: 2018 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Conference on Financial Cryptography and Data Security, FC 2018, held in Nieuwport, Curaçao, in February/ March 2018. The 27 revised full papers and 2 short papers were carefully selected and reviewed from 110 submissions. The papers are grouped in the following topical sections: Financial Cryptography and Data Security, Applied Cryptography, Mobile Systems Security and Privacy, Risk Assessment and Management, Social Networks Security and Privacy and much more. .


Digital
Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
Authors: ---
ISBN: 9783642420337 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.


Digital
Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
Authors: ---
ISBN: 9783642420450 Year: 2013 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.


Book
Applied cryptography and network security : 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings
Authors: ---
ISBN: 3030783723 3030783715 Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.


Book
Applied cryptography and network security. : 19th international conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021 : proceedings
Authors: ---
ISBN: 3030783758 303078374X Year: 2021 Publisher: Cham, Switzerland : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set LNCS 12726 + 12727 constitutes the proceedings of the 19th International Conference on Applied Cryptography and Network Security, ACNS 2021, which took place virtually during June 21-24, 2021. The 37 full papers presented in the proceedings were carefully reviewed and selected from a total of 186 submissions. They were organized in topical sections as follows: Part I: Cryptographic protocols; secure and fair protocols; cryptocurrency and smart contracts; digital signatures; embedded system security; lattice cryptography; Part II: Analysis of applied systems; secure computations; cryptanalysis; system security; and cryptography and its applications.

Keywords

Computer security. --- Computer communication systems. --- Data encryption (Computer science). --- Application software. --- Computer networks --- Systems and Data Security. --- Computer Communication Networks. --- Cryptology. --- Information Systems Applications (incl. Internet). --- Mobile and Network Security. --- Security measures. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Distributed processing --- Protection --- Security measures --- Data encryption (Computer science) --- Xifratge (Informàtica) --- Xarxes d'ordinadors --- Seguretat informàtica --- Xarxes d'ordinadors.

Listing 1 - 10 of 27 << page
of 3
>>
Sort by