History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 170 total

Augmented learning with errors: the untapped potential of the error term. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 333-352 (2015).
WorldCat.org
1
Nearest planes in practice. (English)
Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec~2014, Istanbul, Turkey, October 16‒17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 203-215 (2015).
WorldCat.org
2
On the security of long-lived archiving systems based on the evidence record syntax. (English)
El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26‒28, 2015. Proceedings ‒ in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 27-44 (2015).
WorldCat.org
3
Tuning GaussSieve for speed. (English)
Aranha, F. (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17‒19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 288-305 (2015).
WorldCat.org
4
Mutant differential fault analysis of Trivium MDFA. (English)
Lee, Jooyoung (ed.) et al., Information security and cryptology ‒ ICISC 2014. 17th international conference, Seoul, Korea, December 3‒5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 433-446 (2015).
WorldCat.org
5
A Distributed Reputation System for Certification Authority Trust Management. (English)
TrustCom/BigDataSE/ISPA (1), 1349-1356(2015)
WorldCat.org
6
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. (English)
Computers & Security 50, 16-32(2015)
WorldCat.org
7
Real-World Post-Quantum Digital Signatures. (English)
CSP Forum, 41-52(2015)
WorldCat.org
8
PALPAS - PAssword Less PAssword Synchronization. (English)
ARES, 30-39(2015)
WorldCat.org
9
Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers. (English)
Lange, Tanja (ed.) et al., Selected areas in cryptography ‒ SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14‒16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 402-417 (2014).
WorldCat.org
10
Improvement and efficient implementation of a lattice-based signature scheme. (English)
Lange, Tanja (ed.) et al., Selected areas in cryptography ‒ SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14‒16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 48-67 (2014).
WorldCat.org
11
Trust views for the web PKI. (English)
Katsikas, Sokratis (ed.) et al., Public key infrastructures, services and applications. 10th European workshop, EuroPKI 2013, Egham, UK, September 12‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-53996-1/pbk). Lecture Notes in Computer Science 8341, 134-151 (2014).
WorldCat.org
12
On the efficiency of provably secure NTRU. (English)
Mosca, Michele (ed.), Post-quantum cryptography. 6th international workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1‒3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-11658-7/pbk). Lecture Notes in Computer Science 8772, 22-39 (2014).
WorldCat.org
13
Full analysis of {\sc PRINTcipher} with respect to invariant subspace attack: efficient key recovery and countermeasures. (English)
Des. Codes Cryptography 73, No. 3, 997-1022 (2014).
WorldCat.org
14
Towards lattice based aggregate signatures. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28‒30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 336-355 (2014).
WorldCat.org
15
Long term confidentiality: a survey. (English)
Des. Codes Cryptography 71, No. 3, 459-478 (2014).
WorldCat.org
16
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. (English)
IEICE Transactions 97-A, N0. 9, 1952-1961(2014)
WorldCat.org
17
Introducing asymmetric DC-Nets. (English)
CNS, 508-509(2014)
WorldCat.org
18
Tauglichkeit von Common Criteria-Schutzprofilen für Internetwahlen in Deutschland. (English)
Datenschutz und Datensicherheit 38, N0. 2, 98-102(2014)
WorldCat.org
19
A privacy-enhancing protocol that provides in-network data aggregation and verifiable smart meter billing. (English)
ISCC, 1-6(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 170 total

Valid XHTML 1.0 Transitional Valid CSS!