301
Cryptography and Coding [E-Book] : 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings /
Table of Contents: ...Bits and Booleans -- Semi-bent Functions from Oval Polynomials -- Efficient Generation of Elementary Sequences -- Homomorphic Encryption -- On the Homomorphic Computation of Symmetric Cryptographic Primitives -- Improved Security for a Ring-Based Fully...

Full text 
302
Automated Deduction – CADE-24 [E-Book] : 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings /
Table of Contents: ... Unification Paradigm for Cryptographic Protocol Analysis -- Hierarchical Combination -- PRocH: Proof Reconstruction for HOL Light -- An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description -- Towards Modularly Comparing Programs...

Full text 
303
Post-Quantum Cryptography [E-Book] : 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings /
304
Information and Communications Security [E-Book] : 15th International Conference, ICICS 2013, Beijing, China, November 20-22, 2013. Proceedings /
Table of Contents: ... and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications....

Full text 
305
Radio Frequency Identification [E-Book] : Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers /
306
Advances in Information and Computer Security [E-Book] : 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings /
Table of Contents: ... -- Unconditionally Secure Oblivious Transfer from Real Network Behavior -- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption -- Public Key Cryptosystems -- Efficient Algorithm for Tate Pairing of Composite Order...

Full text 
307
Number Theory and Cryptography [E-Book] : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday /
Table of Contents: ...Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security....

Full text 
308
Advances in Cryptology - ASIACRYPT 2013 [E-Book] : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I /
Table of Contents: ...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...

Full text 
309
Advances in Cryptology - ASIACRYPT 2013 [E-Book] : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II /
Table of Contents: ...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...

Full text 
310
Transactions on Computational Science XVII [E-Book] /
311
Theory of Cryptography [E-Book] : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings /
Table of Contents: ... of new cryptographic problems -- Study of notions of security and relations among them -- Modeling and analysis of cryptographic algorithms -- Study of the complexity assumptions used in cryptography....

Full text 
312
Lightweight Cryptography for Security and Privacy [E-Book] : Second International Workshop, LightSec 2013, Gebze, Turkey, May 6-7, 2013, Revised Selected Papers /
Table of Contents: ... for Wireless Sensor Networks -- An adaptive security architecture for location privacy sensitive sensor network applications -- Cryptographic Protocols -- Secure & Lightweight Distance-Bounding -- Cryptanalysis and Improvement of a Provably Secure RFID Ownership...

Full text 
313
Cryptology and network security : 12th international conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. proceedings [E-Book] /
Table of Contents: ...Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. ....

Full text 
314
Topics in Cryptology – CT-RSA 2012 [E-Book]: The Cryptographers’ Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 – March 2, 2012. Proceedings /
315
Burdens of proof : cryptographic culture and evidence law in the age of electronic documents [E-Book] /
Table of Contents: ...Introduction -- Communication in the presence of adversaries -- On the brink of a revolution -- The equivalent of a written signature -- Written proof -- Paper and state -- The Cryptographic imagination -- Epilogue....

Full text 
316
Cryptology and Network Security [E-Book] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings /
Table of Contents: ...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....

Full text 
317
Advances in Cryptology – ASIACRYPT 2012 [E-Book] : 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings /
318
Information Security Applications [E-Book] : 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers /
319
Security, Privacy, and Applied Cryptography Engineering [E-Book]: Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /
320
Information Systems Security [E-Book] : 8th International Conference, ICISS 2012, Guwahati, India, December 15-19, 2012. Proceedings /
Table of Contents: ... System -- Cryptographic Analysis of a Type of Sequence Generators -- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs -- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks -- Tracking Insecure...

Full text