201
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /
202
Selected Areas in Cryptography - SAC 2015 [E-Book] : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers /
203
The New Codebreakers [E-Book] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday /
Table of Contents: ..., Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed...

Full text 
204
Programming Languages and Systems [E-Book] : 25th European Symposium on Programming, ESOP 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings /
Table of Contents: ...: Binder boilerplate tied up -- On the Relative Expressiveness of Higher-Order Session Processes -- A Realizability Model for a Semantical Value Restriction -- Probabilistic functions and cryptographic oracles in higher order logic -- Extensible and Efficient...

Full text 
205
Information Security [E-Book] : 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016. Proceedings /
Table of Contents: ...Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control -- Privacy and Watermarking -- Software Security -- Encryption, Signatures and Fundamentals....

Full text 
206
Cryptographic Hardware and Embedded Systems – CHES 2016 [E-Book] : 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings /
207
Innovative Security Solutions for Information Technology and Communications [E-Book] : 9th International Conference, SECITC 2016, Bucharest, Romania, June 9-10, 2016, Revised Selected Papers /
Bica, Ion
2016
Table of Contents: ... Set Decoding -- A Cryptographic Approach for Implementing Semantic Web's Trust Layer -- Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret -- Homomorphic Encryption Based On Group Algebras and Goldwasser-Micali...

Full text 
208
Information Security and Cryptology [E-Book] : 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers /
Table of Contents: ...Hash function -- Signature schemes -- Symmetric ciphers -- Elliptic curve and cryptographic fundamentals -- Web and applications security -- Cloud security -- Key management and public key encryption -- Zero knowledge and secure computations -- Software...

Full text 
209
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ... and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation....

Full text 
210
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ... and Homomorphic Cryptography -- ABE and IBE -- Foundation -- Cryptographic Protocol -- Multi-Party Computation....

Full text 
211
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
Table of Contents: ... for Cryptographic Agents -- Attribute-Based Encryption -- Deniable Attribute Based Encryption for Branching Programs from LWE -- Targeted Homomorphic Attribute-Based Encryption -- Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy -- Functional...

Full text 
212
Information and Communications Security [E-Book] : 18th International Conference, ICICS 2016, Singapore, Singapore, November 29 – December 2, 2016, Proceedings /
Table of Contents: ...IoT security -- Cloud security -- Applied cryptography -- Attack behaviour analytics -- Authentication and authorization -- Engineering issues of cryptographic and security systems -- Privacy protection -- Risk evaluation and security -- Key management...

Full text 
213
Information Theoretic Security [E-Book] : 9th International Conference, ICITS 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers /
Table of Contents: ...Secret sharing -- Quantum cryptography -- Visual cryptography -- Cryptographic protocols.-Entropy, extractors and privacy....

Full text 
214
Topics in Cryptology - CT-RSA 2016 [E-Book] : The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings /
215
Progress in Cryptology – AFRICACRYPT 2016 [E-Book] : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /
216
Advances in Cryptology – EUROCRYPT 2016 [E-Book] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I /
217
Advances in Cryptology – EUROCRYPT 2016 [E-Book] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II /
218
Cryptography and Information Security in the Balkans [E-Book] : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers /
Table of Contents: ... -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations...

Full text 
219
Innovative Security Solutions for Information Technology and Communications [E-Book] : 8th International Conference, SECITC 2015, Bucharest, Romania, June 11-12, 2015. Revised Selected Papers /
Bica, Ion
2015
Table of Contents: ... of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error...

Full text 
220
Data and Applications Security and Privacy XXIX [E-Book] : 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings /
Table of Contents: ... Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data....

Full text