History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 180 total

Password requirements markup language. (English)
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4‒6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 426-439 (2016).
WorldCat.org
1
Homomorphic signature schemes. A survey. (English)
SpringerBriefs in Computer Science. Cham: Springer (ISBN 978-3-319-32114-1/pbk; 978-3-319-32115-8/ebook). xi, 64~p. (2016).
WorldCat.org
2
An efficient lattice-based signature scheme with provably secure instantiation. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13‒15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 44-60 (2016).
WorldCat.org
3
On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13‒15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 24-43 (2016).
WorldCat.org
4
Introduction to cryptography. (Einführung in die Kryptographie.) 6th revised edition. (German)
Springer-Lehrbuch. Heidelberg: Springer Spektrum (ISBN 978-3-642-39774-5/pbk; 978-3-0642-39775-2/ebook). xxvi, 330~p. (2016).
WorldCat.org
5
Post-quantum cryptography: state of the art. (English)
Ryan, Peter Y.A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 88-108 (2016).
WorldCat.org
6
Formal Policy-Based Provenance Audit. (English)
IWSEC, 234-253(2016)
WorldCat.org
7
High-Performance and Lightweight Lattice-Based Public-Key Encryption. (English)
IoTPTS@AsiaCCS, 2-9(2016)
WorldCat.org
8
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. (English)
AsiaPKC@AsiaCCS, 11-20(2016)
WorldCat.org
9
Augmented learning with errors: the untapped potential of the error term. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 333-352 (2015).
WorldCat.org
10
Nearest planes in practice. (English)
Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec~2014, Istanbul, Turkey, October 16‒17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 203-215 (2015).
WorldCat.org
11
On the security of long-lived archiving systems based on the evidence record syntax. (English)
El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26‒28, 2015. Proceedings ‒ in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 27-44 (2015).
WorldCat.org
12
Tuning GaussSieve for speed. (English)
Aranha, F. (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17‒19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 288-305 (2015).
WorldCat.org
13
Mutant differential fault analysis of Trivium MDFA. (English)
Lee, Jooyoung (ed.) et al., Information security and cryptology ‒ ICISC 2014. 17th international conference, Seoul, Korea, December 3‒5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 433-446 (2015).
WorldCat.org
14
Real-World Post-Quantum Digital Signatures. (English)
CSP Forum, 41-52(2015)
WorldCat.org
15
PALPAS - PAssword Less PAssword Synchronization. (English)
ARES, 30-39(2015)
WorldCat.org
16
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. (English)
Computers & Security 50, 16-32(2015)
WorldCat.org
17
A Distributed Reputation System for Certification Authority Trust Management. (English)
TrustCom/BigDataSE/ISPA (1), 1349-1356(2015)
WorldCat.org
18
Discrete Ziggurat: a time-memory trade-off for sampling from a Gaussian distribution over the integers. (English)
Lange, Tanja (ed.) et al., Selected areas in cryptography ‒ SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14‒16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 402-417 (2014).
WorldCat.org
19
Improvement and efficient implementation of a lattice-based signature scheme. (English)
Lange, Tanja (ed.) et al., Selected areas in cryptography ‒ SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14‒16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 48-67 (2014).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 180 total

Valid XHTML 1.0 Transitional Valid CSS!