1
Arithmetic of Finite Fields [E-Book] : 9th International Workshop, WAIFI 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers /
Table of Contents: ... Cryptography -- Fast enumeration of superspecial hyperelliptic curves of genus 4 with automorphism group V4 -- Coding theory -- Two Classes of Constacyclic Codes with Variable Parameters -- Near MDS Codes with Dimension 4 and Their Application in Locally Recoverable...

Full text 
2
Combinatorial Algorithms [E-Book] : 34th International Workshop, IWOCA 2023, Tainan, Taiwan, June 7-10, 2023, Proceedings /
3
Combinatorial Algorithms [E-Book] : 33rd International Workshop, IWOCA 2022, Trier, Germany, June 7-9, 2022, Proceedings /
4
Algorithms for Big Data [E-Book] : DFG Priority Program 1736 /
Table of Contents: ... for Big Data and their Applications Scalable Cryptography -- Distributed Data Streams -- Energy-Efficient Scheduling -- The GENO Software Stack -- Laue Algorithms for Big Data Problems in de Novo Genome Assembly -- Scalable Text Index Construction. Big Data...

Full text 
5
Revolutions and Revelations in Computability [E-Book] : 18th Conference on Computability in Europe, CiE 2022, Swansea, UK, July 11-15, 2022, Proceedings /
Table of Contents: ...Bio-computing -- Blockchain -- Combinatory Logic -- Computable Analysis -- Computational Complexity -- Computability in Mathematics -- Computability in Set Theory -- Computability Theory -- Constructive Mathematics -- Cryptography -- Foundations...

Full text 
6
The Amazing World of Quantum Computing [E-Book] /
Table of Contents: ...1. Quantum Cryptography & Quantum Teleportation -- 2. A Quick Comparison of Quantum & Classical Mechanics -- 3. The Birth and Coming of Age of Quantum Mechanics -- 4. Laws of Quantum Mechanics -- 5. Weirdness of Quantum Mechanics -- 6. Mathematical...

Full text 
7
Introduction to cryptography [E-Book] /
Subject (ZB): ...Cryptography -- Mathematics....

Full text 
8
Information Security and Privacy [E-Book] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I /
Table of Contents: ...Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy...

Full text 
9
Mathematical Aspects of Computer and Information Sciences [E-Book] : 6th International Conference, MACIS 2015, Berlin, Germany, November 11-13, 2015, Revised Selected Papers /
10
Computer Science – Theory and Applications [E-Book] : 11th International Computer Science Symposium in Russia, CSR 2016, St. Petersburg, Russia, June 9-13, 2016, Proceedings /
Table of Contents: ...Algorithms and data structures -- Combinatorial optimization -- Constraint solving -- Computational complexity -- Cryptography -- Combinatorics in computer science -- Formal languages and automata -- Computational models and concepts -- Algorithms...

Full text 
11
Pursuit of the Universal [E-Book] : 12th Conference on Computability in Europe, CiE 2016, Paris, France, June 27 - July 1, 2016, Proceedings /
Table of Contents: ...Computable and constructive analysis -- Computation in biological systems -- Cryptography and information theory -- History and philosophy of computing -- Symbolic dynamics -- Weak arithmetic....

Full text 
12
Advances in Cryptology – CRYPTO 2016 [E-Book] : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II /
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...

Full text 
13
Advances in Cryptology – CRYPTO 2016 [E-Book] : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III /
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...

Full text 
14
Advances in Cryptology – CRYPTO 2016 [E-Book] : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I /
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...

Full text 
15
Developments in Language Theory [E-Book] : 20th International Conference, DLT 2016, Montréal, Canada, July 25-28, 2016, Proceedings /
Table of Contents: ... -- Symbolic dynamics; decision problems -- Relationships to complexity theory and logic; picture description and analysis -- Polyominoes and bidimentional patterns; cryptography; concurrency -- Cellular automata; bio-inspried computing; quantum computing....

Full text 
16
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /
17
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...

Full text 
18
Post-Quantum Cryptography [E-Book] : 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings /
19
Topics in Cryptology - CT-RSA 2016 [E-Book] : The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings /
20
Public-Key Cryptography – PKC 2016 [E-Book] : 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I /