1
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
2
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
3
Selected Areas in Cryptography -- SAC 2013 [E-Book] : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers /
Table of Contents: ... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...

Full text 
4
Advances in Cryptology – ASIACRYPT 2014 [E-Book] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II /
Table of Contents: ... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....

Full text 
5
Advances in Cryptology – ASIACRYPT 2014 [E-Book] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I /
Table of Contents: ... -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation....

Full text 
6
Progress in Cryptology – AFRICACRYPT 2014 [E-Book] : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings /
Table of Contents: ... S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum...

Full text 
7
Information Security and Privacy [E-Book] : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Table of Contents: ... Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its...

Full text 
8
Cryptology and Network Security [E-Book] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings /
Table of Contents: ...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....

Full text