History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 182 total

Password requirements markup language. (English)
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4‒6, 2016. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-40252-9/pbk; 978-3-319-40253-6/ebook). Lecture Notes in Computer Science 9722, 426-439 (2016).
WorldCat.org
1
Homomorphic signature schemes. A survey. (English)
SpringerBriefs in Computer Science. Cham: Springer (ISBN 978-3-319-32114-1/pbk; 978-3-319-32115-8/ebook). xi, 64~p. (2016).
WorldCat.org
2
An efficient lattice-based signature scheme with provably secure instantiation. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13‒15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 44-60 (2016).
WorldCat.org
3
On the hardness of LWE with binary error: revisiting the hybrid lattice-reduction and meet-in-the-middle attack. (English)
Pointcheval, David (ed.) et al., Progress in cryptology ‒ AFRICACRYPT 2016. 8th international conference on cryptology in Africa, Fes, Morocco, April 13‒15, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-31516-4/pbk; 978-3-319-31517-1/ebook). Lecture Notes in Computer Science 9646, 24-43 (2016).
WorldCat.org
4
Introduction to cryptography. (Einführung in die Kryptographie.) 6th revised edition. (German)
Springer-Lehrbuch. Heidelberg: Springer Spektrum (ISBN 978-3-642-39774-5/pbk; 978-3-0642-39775-2/ebook). xxvi, 330~p. (2016).
WorldCat.org
5
Post-quantum cryptography: state of the art. (English)
Ryan, Peter Y.A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 88-108 (2016).
WorldCat.org
6
Password Requirements Markup Language. (English)
ACISP (1), 426-439(2016)
WorldCat.org
7
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. (English)
AFRICACRYPT, 44-60(2016)
WorldCat.org
8
Homomorphic Signature Schemes - A Survey (English)
Springer Briefs in Computer Science, 1-60(2016)
WorldCat.org
9
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. (English)
AFRICACRYPT, 24-43(2016)
WorldCat.org
10
High-Performance and Lightweight Lattice-Based Public-Key Encryption. (English)
IoTPTS@AsiaCCS, 2-9(2016)
WorldCat.org
11
Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge. (English)
AsiaPKC@AsiaCCS, 11-20(2016)
WorldCat.org
12
Augmented learning with errors: the untapped potential of the error term. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 333-352 (2015).
WorldCat.org
13
Nearest planes in practice. (English)
Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec~2014, Istanbul, Turkey, October 16‒17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 203-215 (2015).
WorldCat.org
14
On the security of long-lived archiving systems based on the evidence record syntax. (English)
El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26‒28, 2015. Proceedings ‒ in honor of Thierry Berger. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). Lecture Notes in Computer Science 9084, 27-44 (2015).
WorldCat.org
15
Tuning GaussSieve for speed. (English)
Aranha, F. (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17‒19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 288-305 (2015).
WorldCat.org
16
Mutant differential fault analysis of Trivium MDFA. (English)
Lee, Jooyoung (ed.) et al., Information security and cryptology ‒ ICISC 2014. 17th international conference, Seoul, Korea, December 3‒5, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-15942-3/pbk; 978-3-319-15943-0/ebook). Lecture Notes in Computer Science 8949, 433-446 (2015).
WorldCat.org
17
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. (English)
Computers & Security 50, 16-32(2015)
WorldCat.org
18
A Distributed Reputation System for Certification Authority Trust Management. (English)
TrustCom/BigDataSE/ISPA (1), 1349-1356(2015)
WorldCat.org
19
Real-World Post-Quantum Digital Signatures. (English)
CSP Forum, 41-52(2015)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 182 total

Valid XHTML 1.0 Transitional Valid CSS!