101
Applied Cryptography and Network Security Workshops [E-Book] : ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings /
102
Advanced Network Technologies and Intelligent Computing [E-Book] : Second International Conference, ANTIC 2022, Varanasi, India, December 22-24, 2022, Proceedings, Part I /
103
Information and Communications Security [E-Book] : 25th International Conference, ICICS 2023, Tianjin, China, November 18-20, 2023, Proceedings /
Table of Contents: ...Symmetric-Key Cryptography -- SAT-aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA -- Improved Related-Key Rectangle Attack against the Full AES-192 -- Block Ciphers Classification Based on Randomness Test Statistic...

Full text 
104
Data Privacy Management, Cryptocurrencies and Blockchain Technology [E-Book] : ESORICS 2022 International Workshops, DPM 2022 and CBT 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers /
105
Software Defined Chips [E-Book] : Volume II /
106
Novel Developments in Futuristic AI-based Technologies [E-Book] /
Table of Contents: ... and Its Applications to Cryptography -- A Bibliometric Analysis of Problem Structuring Between 1980 and 2019 -- An Improved Approach in Cloud-Assisted IoT Infrastructure with Anonymous Key Issuing -- Internet of Things based Digital Life to Provide Assisted...

Full text 
107
Proceedings of 7th ASRES International Conference on Intelligent Technologies [E-Book] : ICIT 2022, Jakarta, Indonesia /
Table of Contents: ...Post Quantum Cryptography Algorithms: A Review and Applications -- Performance analysis of Hetero-Dielectric Buried Oxide Double Gate Vertical TFET -- Biodigester application to generate electricity and im-prove the quality of life -- Design & Analysis...

Full text 
108
A Nature-Inspired Approach to Cryptology [E-Book] /
Table of Contents: ...Introduction to Nature Inspired Algorithms -- Cryptography Background and Primitives -- Genetic Cryptography -- Neural Cryptography -- DNA based Cryptography -- Optimization of Cryptosystems using Nature Inspired Algorithms -- Bio-inspired Lightweight...

Full text 
109
Information Security and Cryptology - ICISC 2022 [E-Book] : 25th International Conference, ICISC 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers /
Table of Contents: ... Testing of Cryptographic Libraries with Hybrid Fuzzing -- Applied Cryptography -- Public Key Encryption with Hierarchical Authorized Keyword Search -- Private Evaluation of a Decision Tree based on Secret Sharing -- Reputation at Stake! A Trust Layer over...

Full text 
110
Advances in Cryptology - EUROCRYPT 2023 [E-Book] : 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV /
111
Advances in Cryptology - EUROCRYPT 2023 [E-Book] : 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part I /
112
Advances in Cryptology - EUROCRYPT 2023 [E-Book] : 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part V /
113
Information Security and Privacy [E-Book] : 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings /
Table of Contents: ...Symmetric-Key Cryptography -- Improved Differential Cryptanalysis on SPECK Using Plaintext Structures -- Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers -- A New Correlation Cube...

Full text 
114
Cyber Security, Cryptology, and Machine Learning [E-Book] : 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings /
115
Codes, Cryptology and Information Security [E-Book] : 4th International Conference, C2SI 2023, Rabat, Morocco, May 29-31, 2023, Proceedings /
Table of Contents: ...Invited Papers -- Cryptologists should not ignore the history of Al-Andalusia -- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems -- On Catalan Constant Continued Fractions -- Cryptography...

Full text 
116
Intelligent Computing and Networking [E-Book] : Proceedings of IC-ICN 2023 /
117
Proceedings of the Ninth International Conference on Mathematics and Computing [E-Book] : ICMC 2023 /
118
Proceedings of Fourth Doctoral Symposium on Computational Intelligence [E-Book] : DoSCI 2023 /
Table of Contents: ... Control in Hybrid Microgrid -- Alteration Approach for Data Cryptography Based on Grigorchuk's Group Rules to Data Mining Objective with Cloud Computing -- Review of Deep-learning based User-identification by Typing Behavior -- COMPARISON OF DIFFERENT CLOUD...

Full text 
119
Hardware Security Primitives [E-Book] /
Table of Contents: ... -- Fault Injection Resistant Cryptographic Hardware -- Energy and Performance Optimization for Cryptography -- Lightweight Cryptography -- Post-Quantum Cryptography -- Virtual Proof of Reality -- Analog Security....

Full text 
120
Machine Learning in Information and Communication Technology [E-Book] : Proceedings of ICICT 2021, SMIT /