History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 160 total

Trust views for the web PKI. (English)
Katsikas, Sokratis (ed.) et al., Public key infrastructures, services and applications. 10th European workshop, EuroPKI 2013, Egham, UK, September 12‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-53996-1/pbk). Lecture Notes in Computer Science 8341, 134-151 (2014).
WorldCat.org
1
On the efficiency of provably secure NTRU. (English)
Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1‒3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 22-39 (2014).
WorldCat.org
2
Full analysis of {\sc PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures. (English)
Des. Codes Cryptography 73, No. 3, 997-1022 (2014).
WorldCat.org
3
Towards lattice based aggregate signatures. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28‒30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 336-355 (2014).
WorldCat.org
4
Long term confidentiality: a survey. (English)
Des. Codes Cryptography 71, No. 3, 459-478 (2014).
WorldCat.org
5
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. (English)
IEICE TransactionsIEICE Transactions 97-A, N0. 9, 1952-1961(2014)
WorldCat.org
6
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. (English)
ISCC, 1-6(2014)
WorldCat.org
7
Introducing asymmetric DC-Nets. (English)
CNS, 508-509(2014)
WorldCat.org
8
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland. (English)
Datenschutz und DatensicherheitDatenschutz und Datensicherheit 38, N0. 2, 98-102(2014)
WorldCat.org
9
Optimal parameters for $XMSS^{MT }$. (English)
Cuzzocrea, Alfredo (ed.) et al., Security engineering and intelligence informatics. CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40587-7/pbk). Lecture Notes in Computer Science 8128, 194-208 (2013).
WorldCat.org
10
Cryptanalysis of 2-layer nonlinear piece in hand method. (English)
Cuzzocrea, Alfredo (ed.) et al., Security engineering and intelligence informatics. CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2‒6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40587-7/pbk). Lecture Notes in Computer Science 8128, 91-104 (2013).
WorldCat.org
11
How to avoid the breakdown of public key infrastructures. Forward secure signatures for certificate authorities. (English)
De Capitani di Vimercati, Sabrina (ed.) et al., Public key infrastructures, services and applications. 9th European workshop, EuroPKI 2012, Pisa, Italy, September 13‒14, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-40011-7/pbk). Lecture Notes in Computer Science 7868, 53-68 (2013).
WorldCat.org
12
Introduction to public key infrastructures. (English)
Berlin: Springer (ISBN 978-3-642-40656-0/hbk; 978-3-642-40657-7/ebook). xv, 194~p. EUR~53.49; SFR~67.00; \sterling~44.99; \$~69.99 (2013).
WorldCat.org
13
On the security of the Winternitz one-time signature scheme. (English)
Int. J. Appl. Cryptogr. 3, No. 1, 84-96 (2013).
WorldCat.org
14
Towards a publicly-verifiable mix-net providing everlasting privacy. (English)
Sadeghi, Ahmad-Reza (ed.), Financial cryptography and data security. 17th international conference, FC 2013, Okinawa, Japan, April 1‒5, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-39883-4/pbk). Lecture Notes in Computer Science 7859, 197-204 (2013).
WorldCat.org
15
Minkowski, Hermite, and the internet. (Minkowski, Hermite und das Internet.) (German)
Mitt. Dtsch. Math.-Ver. 21, No. 3, 156-160 (2013).
WorldCat.org
16
A multivariate based threshold ring signature scheme. (English)
Appl. Algebra Eng. Commun. Comput. 24, No. 3-4, 255-275 (2013).
WorldCat.org
17
Fast verification for improved versions of the UOV and rainbow signature schemes. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 188-202 (2013).
WorldCat.org
18
Cryptanalysis of hash-based tamed transformation and minus signature scheme. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 155-164 (2013).
WorldCat.org
19
Optimizing guessing strategies for algebraic cryptanalysis with applications to EPCBC. (English)
Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28‒30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 175-197 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 160 total

Valid XHTML 1.0 Transitional Valid CSS!