1
2
Beckmann, Arnold
2016
Table of Contents:
“...Computable and constructive analysis -- Computation in biological systems -- Cryptography and information theory -- History and philosophy of computing -- Symbolic dynamics -- Weak arithmetic....”2016
Full text
3
4
Duquesne, Sylvain
2016
Table of Contents:
“...Elliptic curves -- Applications -- Irreducible polynomials.-Applications to cryptography -- Boolean functions -- Cryptography -- Cryptography and Boolean functions....”2016
Full text
5
Catania, Barbara
2016
Table of Contents:
“...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...”2016
Full text
6
7
Dinh, Thang N.
2016
Table of Contents:
“...Game Theory and Algorithms -- Parameterized Complexity and Algorithms -- Database and Data Structures -- Computational Complexity -- Approximation Algorithms -- Cryptography -- Network and Algorithms -- Graph Theory and Algorithms.-Computational Geometry...”2016
Full text
8
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
9
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
10
Katz, Jonathan
2016
Table of Contents:
“...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis -- Cryptography in theory and practice -- Compromised systems -- Symmetric cryptanalysis -- Algorithmic number theory -- Symmetric primitives -- Asymmetric...”2016
Full text
11
12
Hirt, Martin
2016
Table of Contents:
“...TCC Test-of-Time Award -- From Indifferentiability to Constructive Cryptography (and Back) -- Foundations -- Fast Pseudorandom Functions Based on Expander Graphs -- 3-Message Zero Knowledge Against Human Ignorance -- The GGM Function Family is a Weakly...”2016
Full text
13
Hirt, Martin
2016
Table of Contents:
“... Sharing Requires a Linear Size Alphabet -- How to Share a Secret, Infinitely -- New Models -- Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond -- Access Control Encryption: Enforcing Information Flow with Cryptography....”2016
Full text
14
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
15
Cheon, Jung Hee
2016
Table of Contents:
“...Mathematical Analysis -- AES and White-Box -- Hash Function; Randomness -- Authenticated Encryption -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable Security -- Digital Signature -- Functional...”2016
Full text
16
17
Brlek, Srečko
2016
Table of Contents:
“... -- Symbolic dynamics; decision problems -- Relationships to complexity theory and logic; picture description and analysis -- Polyominoes and bidimentional patterns; cryptography; concurrency -- Cellular automata; bio-inspried computing; quantum computing....”2016
Full text
18
Table of Contents:
“...Algorithms and data structures -- Combinatorial optimization -- Constraint solving -- Computational complexity -- Cryptography -- Combinatorics in computer science -- Formal languages and automata -- Computational models and concepts -- Algorithms...”
Full text
Full text
19
20
Groth, Jens.
2015
Table of Contents:
“...Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience....”2015
Full text