1
Understanding Network Hacks [E-Book] : Attack and Defense with Python 3 /
Table of Contents: ...Installation -- Networks 4 newbies -- Python Basics -- Layer 2 attacks -- TCP / IP Tricks -- WHO IS DNS? -- HTTP Hacks -- Wifi fun -- Feeling Bluetooth on the Tooth -- Bargain Box Kung Fu -- Scapy Reference -- Secondary Links -- Index....

Full text 
2
Lightweight Cryptography for Security and Privacy [E-Book] : Third International Workshop, LightSec 2014, Istanbul, Turkey, September 1-2, 2014, Revised Selected Papers /
Table of Contents: ...The SIMON and SPECK Block Ciphers on AVR 8-Bit Microcontrollers -- The Multiplicative Complexity of Boolean Functions on Four and Five Variables -- A Flexible and Compact Hardware Architecture for the SIMON Block Cipher -- AES Smaller Than S-Box...

Full text 
3
Evolutionary Computation in Combinatorial Optimization [E-Book] : 15th European Conference, EvoCOP 2015, Copenhagen, Denmark, April 8-10, 2015, Proceedings /
Table of Contents: ... and Lower Bounds on Unrestricted Black-Box Complexity of JUMPn,l -- Using Local Search to Evaluate Dispatching Rules in Dynamic Job Shop Scheduling....

Full text 
4
Combinatorial Pattern Matching [E-Book] : 26th Annual Symposium, CPM 2015, Ischia Island, Italy, June 29 -- July 1, 2015, Proceedings /
Table of Contents: ... of the Minimum Error Correction Problem -- Fast String Dictionary Lookup with One Error -- On the Readability of Overlap Digraphs -- Improved Algorithms for the Boxed-Mesh Permutation Pattern Matching Problem -- Range Minimum Query Indexes in Higher Dimensions...

Full text 
5
Selected Areas in Cryptography -- SAC 2013 [E-Book] : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers /
Table of Contents: ... Search for Quadratic Systems in F2 on FPGAs -- Faster Hash-based Signatures with Bounded Leakage -- White-Box Security Notions for Symmetric Encryption Schemes -- Two Attacks on a White-Box AES Implementation -- Extended Generalized Feistel Networks using...

Full text 
6
Mathematical Software – ICMS 2014 [E-Book] : 4th International Congress, Seoul, South Korea, August 5-9, 2014. Proceedings /
Table of Contents: ... System for Mathematical Theory Exploration -- New Approaches in Black Box Group Theory -- A GAP Package for Computing with Real Semisimple Lie Algebras -- Bacterial Genomics and Computational Group Theory: The BioGAP Package for GAP -- SgpDec: Cascade (De...

Full text 
7
Constructive Side-Channel Analysis and Secure Design [E-Book] : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers /
Table of Contents: ... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...

Full text 
8
Theory of Cryptography [E-Book] : 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings /
Table of Contents: ...Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding -- Obfuscation for Evasive Functions -- On Extractability Obfuscation -- Two-Round Secure MPC from Indistinguishability Obfuscation -- Chosen Ciphertext Security via Point...

Full text 
9
Learning and Intelligent Optimization [E-Book] : 7th International Conference, LION 7, Catania, Italy, January 7-11, 2013, Revised Selected Papers /
Table of Contents: ... Theory Induction -- Features for Exploiting Black-Box Optimization Problem Structure -- MOCA-I: Discovering Rules and Guiding Decision Maker in the Context of Partial Classification in Large and Imbalanced Datasets -- Sharing Information in Parallel Search...

Full text 
10
Constructive Side-Channel Analysis and Secure Design [E-Book] : 4th International Workshop, COSADE 2013, Paris, France, March 6-8, 2013, Revised Selected Papers /
Table of Contents: ... Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers -- Updated Recommendations for Blinded Exponentiation vs. Single Trace Analysis -- On 3-Share Threshold Implementations for 4-Bit S-boxes -- Collision-Correlation...

Full text 
11
Experimental Algorithms [E-Book] : 12th International Symposium, SEA 2013, Rome, Italy, June 5-7, 2013. Proceedings /
Table of Contents: ... with Non-modular Regions.- Telling Stories Fast: Via Linear-Time Delay Pitch Enumeration -- Undercover Branching.- Quadratic Outer Approximation for Convex Integer Programming with Box Constraints -- Separable Non-convex Underestimators for Binary Quadratic...

Full text 
12
Selected Areas in Cryptography [E-Book] : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers /
Table of Contents: ...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box...

Full text 
13
Applications of Evolutionary Computation [E-Book] : 16th European Conference, EvoApplications 2013, Vienna, Austria, April 3-5, 2013. Proceedings /
Table of Contents: ... for Serpentine Channel Heat Sink -- Towards Non-linear ConstraintEstimation for Expensive Optimization Repair Methods for Box Constraints Revisited -- Scalability of Population-Based Search Heuristics for Many-Objective Optimization -- On GPU Based Fitness Evaluation...

Full text 
14
Learning and Intelligent Optimization [E-Book]: 6th International Conference, LION 6, Paris, France, January 16-20, 2012, Revised Selected Papers /
Table of Contents: ... on Large Population MOEA Using Adaptive ε-Box Dominance and Neighborhood Recombination for Many -- Objective Optimization -- A Non-adaptive Stochastic Local Search Algorithm High-Dimensional Model-Based Optimization Based on Noisy Evaluations of Computer Games...

Full text 
15
Security, Privacy, and Applied Cryptography Engineering [E-Book]: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /
Table of Contents: ... Ciphers -- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs -- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack -- Towards Formal Analysis of Key Control in Group Key Agreement Protocols -- Some...

Full text 
16
Artificial Evolution [E-Book] : 10th International Conference, Evolution Artificielle, EA 2011, Angers, France, October 24-26, 2011, Revised Selected Papers /
Table of Contents: ... Optimizer Enhanced with a Differential Evolution Scheme -- Probabilistic Algorithms Evolution of Multisensory Integration in Large Neural Fields -- Reducing the Learning Time of Tetris in Evolution Strategies -- Theory and Evolutionary Search -- Black-Box...

Full text 
17
Information Retrieval Technology [E-Book] : 8th Asia Information Retrieval Societies Conference, AIRS 2012, Tianjin, China, December 17-19, 2012. Proceedings /
Table of Contents: ... and Document-Centric Features -- Unsupervised Extraction of Popular Product Attributes from Web Sites -- Aggregating Opinions on Hot Topics from Microblog Responses -- Topic Sequence Kernel -- Opening Machine Translation Black Box for Cross-Language Information...

Full text