1
Bhasin, Shivam
2024
Table of Contents:
“...Symmetric-key cryptography, Hash functions, Authenticated Encryption Modes -- Multimixer-156: Universal Keyed Hashing Based on Integer Multiplication and cyclic shift -- On the Security of Triplex- and Multiplex-type Constructions with Smaller Tweak Size...”2024
Full text
2
Bhasin, Shivam
2024
Table of Contents:
“... Functions -- Distributed Protocols for Oblivious Transfer and Polynomial Evaluation -- Obfuscating Decision Trees -- Privacy-Preserving Plagiarism Checking -- PURED: A unified framework for resource-hard functions -- Post-quantum cryptography -- Implementing...”2024
Full text
3
4
5
Hsieh, Sun-Yuan
2022
Table of Contents:
“... -- Vision-Based Lightweight Facial Respiration and Heart Rate Measurement Technology -- GAN-based Criminal Suspect Face Generator -- Cryptography and Information Security -- Automatic Summarization of Critial Threat Intelligence Using Transfer Learning -- Anti...”2022
Full text
6
Liu, Zhiming
2022
Table of Contents:
“... Commutation modulo Alpha-Equivalence in Nominal Rewriting -- Local XOR Unification: Definitions, Algorithms and Application to Cryptography -- A Matching Logic Foundation for Alk -- A Type System with Subtyping for WebAssembly's Stack Polymorphism -- A Verified...”2022
Full text
7
Castañeda, Armando
2022
Table of Contents:
“... Diversity Constraints -- Obtaining Approximately Optimal and Diverse Solutions via Dispersion -- Cryptography -- On APN functions whose graphs are maximal Sidon sets -- On the subfield codes of a subclass of optimal cyclic codes and their covering structures...”2022
Full text
8
Isobe, Takanori
2022
Table of Contents:
“...Foundation -- Symmetric Key Cryptology -- Protocols and Implementation -- Cryptanalysis -- Boolean Functions -- Quantum Cryptography and Cryptanalysis -- Post Quantum Cryptography -- Author Index....”2022
Full text
9
10
Hughes, Ciaran
2021
Table of Contents:
“...Contents -- 1 Introduction to Superposition -- 2 What is a Qubit? -- 3 Creating Superposition: The Beam Splitter -- 4 Creating Superposition: Stern-Gerlach -- 5 Quantum Cryptography -- 6 Quantum Gates -- 7 Entanglement -- 8 Quantum Teleportation -- 9...”2021
Full text
11
12
Buell, Duncan
2021
Table of Contents:
“... Cryptography -- 15. Quantum Computing and Cryptography -- 16. Lattice-Based Cryptography -- 17. Homomorphic Encryption -- 18. Exercises....”2021
Full text
13
Pieprzyk, Josef
2017
Table of Contents:
“...Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy...”2017
Full text
14
Catania, Barbara
2016
Table of Contents:
“...Foundations of Computer Science -- Cryptography in a Quantum World -- Relating Sublinear Space Computability among Graph Connectivity and Related Problems -- Learning Automatic Families of Languages -- Software Engineering: Methods, Tools, Applications...”2016
Full text
15
16
17
18
19
Echizen, Isao
2016
Table of Contents:
“... Data Hiding for Encrypted Audios by High Order Smoothness -- Completely Separable Reversible Data Hiding in Encrypted Images -- Optimal Histogram-pair and Prediction-error Based Reversible Data Hiding for Medical Images -- Visual Cryptography...”2016
Full text
20
Naccache, David
2016
Table of Contents:
“..., Future -- The Fall of a Tiny Star -- Post-Quantum Cryptography: State of the Art -- What is the future of cryptography? -- Efficient Cryptographic Implementations -- Bitsliced High-Performance AES-ECB on GPUs -- Buying AES Design Resistance with Speed...”2016
Full text