Listing 1 - 10 of 21 | << page >> |
Sort by
|
Choose an application
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- computernetwerken
Choose an application
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.
Computers --Access control --Congresses. --- Computers --Access control. --- Data encryption (Computer science) --Congresses. --- Data encryption (Computer science). --- Computers --- Data encryption (Computer science) --- Computer Science --- Engineering & Applied Sciences --- Access control --- Computer science. --- Computer programming. --- Data structures (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Programming Techniques. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Algorithm Analysis and Problem Complexity. --- Math Applications in Computer Science. --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Informatics --- Science --- Mathematics --- Foundations --- Programming --- Data structures (Computer scienc. --- Computer software. --- Cryptology. --- Data Structures and Information Theory. --- Software, Computer --- Computer systems --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer science --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Algorithm Analysis and Problem Complexity. --- Coding and Information Theory. --- Discrete Mathematics in Computer Science. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Mathematics. --- Mathematics --- Foundations --- Protection --- Security measures --- Computer software. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Software, Computer --- Data encryption (Computer science) --- Information theory. --- Computer science—Mathematics. --- Communication theory --- Communication --- Cybernetics
Choose an application
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.
Data encryption (Computer science). --- Software engineering. --- Computer science. --- Logic design. --- Coding theory. --- Cryptology. --- Software Engineering. --- Computers and Society. --- Information Systems Applications (incl. Internet). --- Logic Design. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Design, Logic --- Design of logic systems --- Electronic circuit design --- Logic circuits --- Switching theory --- Informatics --- Science --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computers --- Cryptography. --- Access control. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computers and civilization. --- Application software. --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Civilization and computers --- Civilization
Choose an application
Computer networks --- Computer security. --- Security measures --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
Choose an application
Computer networks --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Computer Science. --- Data Encryption. --- Security. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Systems and Data Security. --- Discrete Mathematics in Computer Science. --- Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Mathematics --- Security measures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Foundations --- Data protection. --- Computer software. --- Information Systems. --- Computational complexity. --- Cryptology. --- Complexity, Computational --- Machine theory --- Software, Computer --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer science—Mathematics.
Choose an application
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.
Mathematical logic --- Ergodic theory. Information theory --- Complex analysis --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- algebra --- coderen --- DES (data encryption standard) --- cryptologie --- complexe analyse (wiskunde) --- informatica --- wiskunde --- programmatielogica --- informatietheorie
Choose an application
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.
Complex analysis --- Discrete mathematics --- Computer science --- Computer architecture. Operating systems --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- informatica --- computerbeveiliging --- computernetwerken
Listing 1 - 10 of 21 | << page >> |
Sort by
|