1
Mathematics for Computer Scientists [E-Book] : A Practice-Oriented Approach /
2
Pursuit of the Universal [E-Book] : 12th Conference on Computability in Europe, CiE 2016, Paris, France, June 27 - July 1, 2016, Proceedings /
Table of Contents: ...Computable and constructive analysis -- Computation in biological systems -- Cryptography and information theory -- History and philosophy of computing -- Symbolic dynamics -- Weak arithmetic....

Full text 
3
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /
4
Arithmetic of Finite Fields [E-Book] : 6th International Workshop, WAIFI 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers /
Table of Contents: ...Elliptic curves -- Applications -- Irreducible polynomials.-Applications to cryptography -- Boolean functions -- Cryptography -- Cryptography and Boolean functions....

Full text 
5
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...

Full text 
6
Discrete algebraic methods : arithmetic, cryptography, automata, and groups [E-Book] /
7
Computing and Combinatorics [E-Book] : 22nd International Conference, COCOON 2016, Ho Chi Minh City, Vietnam, August 2-4, 2016, Proceedings /
Table of Contents: ...Game Theory and Algorithms -- Parameterized Complexity and Algorithms -- Database and Data Structures -- Computational Complexity -- Approximation Algorithms -- Cryptography -- Network and Algorithms -- Graph Theory and Algorithms.-Computational Geometry...

Full text 
8
Advances in Cryptology – CRYPTO 2016 [E-Book] : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II /
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...

Full text 
9
Advances in Cryptology – CRYPTO 2016 [E-Book] : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III /
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...

Full text 
10
Advances in Cryptology – CRYPTO 2016 [E-Book] : 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I /
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...

Full text 
11
Parallel Problem Solving from Nature – PPSN XIV [E-Book] : 14th International Conference, Edinburgh, UK, September 17-21, 2016, Proceedings /
12
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I /
Table of Contents: ...TCC Test-of-Time Award -- From Indifferentiability to Constructive Cryptography (and Back) -- Foundations -- Fast Pseudorandom Functions Based on Expander Graphs -- 3-Message Zero Knowledge Against Human Ignorance -- The GGM Function Family is a Weakly...

Full text 
13
Theory of Cryptography [E-Book] : 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part II /
Table of Contents: ... Sharing Requires a Linear Size Alphabet -- How to Share a Secret, Infinitely -- New Models -- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond -- Access Control Encryption: Enforcing Information Flow with Cryptography....

Full text 
14
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
15
Advances in Cryptology – ASIACRYPT 2016 [E-Book] : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II /
Table of Contents: ...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...

Full text 
16
Selected Areas in Cryptography - SAC 2015 [E-Book] : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers /
17
Developments in Language Theory [E-Book] : 20th International Conference, DLT 2016, Montréal, Canada, July 25-28, 2016, Proceedings /
Table of Contents: ... -- Symbolic dynamics; decision problems -- Relationships to complexity theory and logic; picture description and analysis -- Polyominoes and bidimentional patterns; cryptography; concurrency -- Cellular automata; bio-inspried computing; quantum computing....

Full text 
18
Computer Science – Theory and Applications [E-Book] : 11th International Computer Science Symposium in Russia, CSR 2016, St. Petersburg, Russia, June 9-13, 2016, Proceedings /
Table of Contents: ...Algorithms and data structures -- Combinatorial optimization -- Constraint solving -- Computational complexity -- Cryptography -- Combinatorics in computer science -- Formal languages and automata -- Computational models and concepts -- Algorithms...

Full text 
19
Mathematical Aspects of Computer and Information Sciences [E-Book] : 6th International Conference, MACIS 2015, Berlin, Germany, November 11-13, 2015, Revised Selected Papers /
20
Cryptography and Coding [E-Book] : 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings /
Table of Contents: ...Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience....

Full text