241
243
Yang, Yanjiang
2015
Table of Contents:
“...Signature and authentication -- Secure protocols and access control -- Cloud security -- cryptographic aspects -- Software security -- Security analysis -- Secure communication and privacy....”2015
Full text
244
Bica, Ion
2015
Table of Contents:
“... of Sponge based MAC-PHOTON -- A Novel Fast and Secure Chaos-Based Algorithm for Image Encryption -- A Novel Key Management for Virtually Limitless Key Size -- Efficient Montgomery Multiplication on GPUs -- Applying Cryptographic Acceleration Techniques to Error...”2015
Full text
245
Kolesnikov, Vladimir
2015
Table of Contents:
“...Secure computation: primitives and new models -- Public key cryptographic primitives -- Secure computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric crypto) -- Privacy and policy enforcement...”2015
Full text
246
247
248
249
250
Oswald, Elisabeth.
2015
Table of Contents:
“... Knowledge -- Hosting Services on an Untrusted Cloud -- How to Obfuscate Programs Directly -- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data -- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World...”2015
Full text
251
Ors, Berna.
2015
Table of Contents:
“... Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer...”2015
Full text
252
253
254
Machado, Penousal.
2015
Table of Contents:
“... and Question-Answer Ranking in IBM Watson -- Automatic Evolution of Parallel Recursive Programs -- Proposal and Preliminary Investigation of a Fitness Function for Partial Differential Models -- Evolutionary Methods for the Construction of Cryptographic Boolean...”2015
Full text
255
Table of Contents:
“... Cryptographic Enforcement of Information Flow Policies -- Inference Leakage Detection for Authorization Policies over RDF Data....”
Full text
Full text
256
Alencar, Marcelo S.
2015
Table of Contents:
“...8. Theoretical cryptography -- 8.1 Introduction -- 8.2 Cryptographic aspects of computer networks -- 8.3 Principles of cryptography -- 8.4 Information theoretical aspects of cryptography -- 8.5 Mutual information for cryptosystems --...”2015
Full text
257
Sano, Kentaro.
2015
Table of Contents:
“... Management Inside Configurable Regions of Interest in Mesh-Based Networks-on-Chip -- Survey on Real-Time Network-on-Chip Architectures -- Cryptography Applications Efficient SR-Latch PUF -- Hardware Benchmarking of Cryptographic Algorithms Using High-Level...”2015
Full text
258
Aranha, Diego F.
2015
Table of Contents:
“...Cryptographic Engineering -- Privacy -- Cryptanalysis....”2015
Full text
260
Schmidt, Kai-Uwe.
2014
Table of Contents:
“...Relationships Between CCZ and EA Equivalence Classes and Corresponding Code Invariants -- Boolean Functions -- Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions -- Properties of a Family of Cryptographic Boolean Functions -- A...”2014
Full text