History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 151 total

Introduction to public key infrastructures. (English)
Berlin: Springer (ISBN 978-3-642-40656-0/hbk; 978-3-642-40657-7/ebook). xv, 194~p. EUR~53.49; SFR~67.00; \sterling~44.99; \$~69.99 (2013).
WorldCat.org
1
On the security of the Winternitz one-time signature scheme. (English)
Int. J. Appl. Cryptogr. 3, No. 1, 84-96 (2013).
WorldCat.org
2
Towards a publicly-verifiable mix-net providing everlasting privacy. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 197-204 (2013).
WorldCat.org
3
Minkowski, Hermite, and the internet. (Minkowski, Hermite und das Internet.) (German)
Mitt. Dtsch. Math.-Ver. 21, No. 3, 156-160 (2013).
WorldCat.org
4
A multivariate based threshold ring signature scheme. (English)
Appl. Algebra Eng. Commun. Comput. 24, No. 3-4, 255-275 (2013).
WorldCat.org
5
Fast verification for improved versions of the UOV and rainbow signature schemes. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 188-202 (2013).
WorldCat.org
6
Cryptanalysis of hash-based tamed transformation and minus signature scheme. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 155-164 (2013).
WorldCat.org
7
Optimizing guessing strategies for algebraic cryptanalysis with applications to EPCBC. (English)
Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28‒30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 175-197 (2013).
WorldCat.org
8
Many weak keys for printcipher: fast key recovery and countermeasures. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 189-206 (2013).
WorldCat.org
9
On the security of the Winternitz one-time signature scheme. (English)
IJACTIJACT 3, N0. 1, 84-96(2013)
WorldCat.org
10
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method. (English)
CD-ARES Workshops, 91-104(2013)
WorldCat.org
11
Optimal Parameters for XMSS MT. (English)
CD-ARES Workshops, 194-208(2013)
WorldCat.org
12
Prêt à Voter Providing Everlasting Privacy. (English)
VOTE-ID, 156-175(2013)
WorldCat.org
13
Improved algebraic side-channel attack on AES. (English)
J. Cryptographic EngineeringJ. Cryptographic Engineering 3, N0. 3, 139-156(2013)
WorldCat.org
14
Trust Views for the Web PKI. (English)
EuroPKI, 134-151(2013)
WorldCat.org
15
On the design of hardware building blocks for modern lattice-based encryption schemes. (English)
Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 512-529 (2012).
WorldCat.org
16
Public key cryptography ‒ PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21‒23, 2012. Proceedings. (English)
Lecture Notes in Computer Science 7293. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). xiv, 734~p. \$~131.00 (2012).
WorldCat.org
17
Selecting parameters for secure McEliece-based cryptosystems. (English)
Int. J. Inf. Sec.Int. J. Inf. Sec. 11, N0. 3, 137-147(2012)
WorldCat.org
18
Forward Secure Signatures on Smart Cards. (English)
Selected Areas in Cryptography, 66-80(2012)
WorldCat.org
19
IT-Sicherheitsforschung in Darmstadt - von den Grundlagen bis zur Anwendung. (English)
Praxis der Informationsverarbeitung und KommunikationPraxis der Informationsverarbeitung und Kommunikation 35, N0. 4, 305-308(2012)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 151 total

Valid XHTML 1.0 Transitional Valid CSS!