261
Candidate Multilinear Maps [E-Book]
262
Information Security Practice and Experience [E-Book] : 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings /
Table of Contents: ...Access Control in and Around the Browser -- Improving Thomlinson-Walker’s Software Patching Scheme Using Standard Cryptographic and Statistical Tools -- Preserving Receiver-Location Privacy in Wireless Sensor Networks -- Data Security and Privacy...

Full text 
263
Advances in Cryptology – EUROCRYPT 2014 [E-Book] : 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings /
264
Information Theoretic Security [E-Book] : 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings /
Table of Contents: ... with applications for quantum key distribution -- Superposition Attacks on Cryptographic Protocols -- Overcoming Weak Expectations via the Renyi Entropy and the Expanded Computational Entropy -- Modulus Computational Entropy -- Broadcast (and Round) Efficient Verifiable...

Full text 
265
Pairing-Based Cryptography – Pairing 2013 [E-Book] : 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers /
266
Topics in Cryptology – CT-RSA 2014 [E-Book] : The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings /
Table of Contents: ... -- Automatic Search for Differential Trails in ARX Ciphers -- CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions -- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation -- Group Signatures with Message...

Full text 
267
Theory of Cryptography [E-Book] : 11th Theory of Cryptography Conference, TCC 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings /
Table of Contents: ...-Party Computation -- On the Cryptographic Complexity of the Worst Functions -- Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol -- One-Sided Adaptively Secure Two-Party Computation -- Multi-linear Secret-Sharing...

Full text 
268
Security, Privacy, and Applied Cryptography Engineering [E-Book] : 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings /
Table of Contents: ...Cryptographic building blocks -- Mini tutorial -- Attacks and countermeasures -- Tools and methods -- Secure systems and applications....

Full text 
269
Sequences and Their Applications - SETA 2014 [E-Book] : 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings /
Table of Contents: ...Relationships Between CCZ and EA Equivalence Classes and Corresponding Code Invariants -- Boolean Functions -- Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions -- Properties of a Family of Cryptographic Boolean Functions -- A...

Full text 
270
Selected Areas in Cryptography -- SAC 2014 [E-Book] : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers /
271
Security Standardisation Research [E-Book] : First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings /
Table of Contents: ...Security standardisation research, including cryptographic evaluation -- Standards development -- Analysis with formal methods -- Potential future areas of standardisation.- Improving existing standards....

Full text 
272
Transactions on Data Hiding and Multimedia Security IX [E-Book] : Special Issue on Visual Cryptography /
273
Post-Quantum Cryptography [E-Book] : 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings /
274
Information Security and Privacy [E-Book] : 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /
Table of Contents: ...Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange -- Fundamentals -- Lattices -- Homomorphic encryption -- Applications....

Full text 
275
Advances in Information and Computer Security [E-Book] : 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings /
Table of Contents: ... Reverse Engineering -- Hydra: An energy-efficient programmable cryptographic coprocessor supporting elliptic-curve pairings over fields of large characteristics -- Foundation.-On the Security Proof of an Authentication Protocol from Eurocrypt 2011 -- Improved...

Full text 
276
Foundations of Security Analysis and Design VII [E-Book] : FOSAD 2012/2013 Tutorial Lectures /
Table of Contents: ... ProVerif.- Defensive JavaScript: Building and Verifying Secure Web Components.- Information Flow Control for Web Scripts -- EasyCrypt: A Tutorial.- Cryptographic Voting — A Gentle Introduction.- Encryption and Fragmentation for Data Confidentiality in the Cloud...

Full text 
277
Constructive Side-Channel Analysis and Secure Design [E-Book] : 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers /
Table of Contents: ... for Efficient MIA -- Generic DPA attacks: curse or blessing? -- Template Attacks on Different Devices -- Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis -- A Multiple-Fault Injection Attack by Adaptive Timing Control under Black-Box...

Full text 
278
Cryptographic Hardware and Embedded Systems – CHES 2014 [E-Book] : 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings /
279
Progress in Cryptology – AFRICACRYPT 2014 [E-Book] : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings /
280
Selected Areas in Cryptography -- SAC 2013 [E-Book] : 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers /
Table of Contents: ...)) in small characteristic -- High Precision Discrete Gaussian Sampling on FPGAs -- Discrete Ziggurat: A Time-Memory Trade-o for Sampling from a Gaussian Distribution over the Integers -- Elliptic Curves, Pairings and RSA A High-Speed Elliptic Curve Cryptographic...

Full text