1
Progress in Cryptology - INDOCRYPT 2023 [E-Book] : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I /
Table of Contents: ...Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes -- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift -- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size...

Full text 
2
Progress in Cryptology - INDOCRYPT 2023 [E-Book] : 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II /
Table of Contents: ... Functions -- Distributed Protocols for Oblivious Transfer and Polynomial Evaluation -- Obfuscating Decision Trees -- Privacy-Preserving Plagiarism Checking -- PURED: A unified framework for resource-hard functions -- Post-quantum cryptography -- Implementing...

Full text 
3
Mathematical Foundations of Software Engineering [E-Book] : A Practical Guide to Essentials /
4
Developments in Language Theory [E-Book] : 27th International Conference, DLT 2023, Umeå, Sweden, June 12-16, 2023, Proceedings /
5
New Trends in Computer Technologies and Applications [E-Book] : 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, Proceedings /
Table of Contents: ... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...

Full text 
6
Theoretical Aspects of Computing - ICTAC 2022 [E-Book] : 19th International Colloquium, Tbilisi, Georgia, September 27-29, 2022, Proceedings /
Table of Contents: ... Commutation modulo Alpha-Equivalence in Nominal Rewriting -- Local XOR Unification: Definitions, Algorithms and Application to Cryptography -- A Matching Logic Foundation for Alk -- A Type System with Subtyping for WebAssembly's Stack Polymorphism -- A Verified...

Full text 
7
LATIN 2022: Theoretical Informatics [E-Book] : 15th Latin American Symposium, Guanajuato, Mexico, November 7-11, 2022, Proceedings /
Table of Contents: ... Diversity Constraints -- Obtaining Approximately Optimal and Diverse Solutions via Dispersion -- Cryptography -- On APN functions whose graphs are maximal Sidon sets -- On the subfield codes of a subclass of optimal cyclic codes and their covering structures...

Full text 
8
Progress in Cryptology - INDOCRYPT 2022 [E-Book] : 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings /
Table of Contents: ...Foundation -- Symmetric Key Cryptology -- Protocols and Implementation -- Cryptanalysis -- Boolean Functions -- Quantum Cryptography and Cryptanalysis -- Post Quantum Cryptography -- Author Index....

Full text 
9
Algebraic Informatics [E-Book] : 9th International Conference, CAI 2022, Virtual Event, October 27-29, 2022, Proceedings /
10
Quantum Computing for the Quantum Curious [E-Book] /
Table of Contents: ...Contents -- 1 Introduction to Superposition -- 2 What is a Qubit? -- 3 Creating Superposition: The Beam Splitter -- 4 Creating Superposition: Stern-Gerlach -- 5 Quantum Cryptography -- 6 Quantum Gates -- 7 Entanglement -- 8 Quantum Teleportation -- 9...

Full text 
11
Developments in Language Theory [E-Book] : 25th International Conference, DLT 2021, Porto, Portugal, August 16-20, 2021, Proceedings /
12
Fundamentals of Cryptography [E-Book] : Introducing Mathematical and Algorithmic Foundations /
Table of Contents: ... Cryptography -- 15. Quantum Computing and Cryptography -- 16. Lattice-Based Cryptography -- 17. Homomorphic Encryption -- 18. Exercises....

Full text 
13
Information Security and Privacy [E-Book] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I /
Table of Contents: ...Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy...

Full text 
14
SOFSEM 2016: Theory and Practice of Computer Science [E-Book] : 42nd International Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 23-28, 2016, Proceedings /
Table of Contents: ...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...

Full text 
15
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /
16
Theory of Cryptography [E-Book] : 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /
17
Selected Areas in Cryptography - SAC 2015 [E-Book] : 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers /
18
Information Security Applications [E-Book] : 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers /
19
Digital-Forensics and Watermarking [E-Book] : 14th International Workshop, IWDW 2015, Tokyo, Japan, October 7-10, 2015, Revised Selected Papers /
Table of Contents: ... Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography...

Full text 
20
The New Codebreakers [E-Book] : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday /
Table of Contents: ..., Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed...

Full text