301
Stam, Martijn.
2013
Table of Contents:
“...Bits and Booleans -- Semi-bent Functions from Oval Polynomials -- Efficient Generation of Elementary Sequences -- Homomorphic Encryption -- On the Homomorphic Computation of Symmetric Cryptographic Primitives -- Improved Security for a Ring-Based Fully...”2013
Full text
302
Table of Contents:
“... Unification Paradigm for Cryptographic Protocol Analysis -- Hierarchical Combination -- PRocH: Proof Reconstruction for HOL Light -- An Improved BDD Method for Intuitionistic Propositional Logic: BDDIntKt System Description -- Towards Modularly Comparing Programs...”
Full text
Full text
303
304
Qing, Sihan.
2013
Table of Contents:
“... and Defense -- Engineering Issues of Crypto -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications....”2013
Full text
305
306
Sakiyama, Kazuo.
2013
Table of Contents:
“... -- Unconditionally Secure Oblivious Transfer from Real Network Behavior -- Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption -- Public Key Cryptosystems -- Efficient Algorithm for Tate Pairing of Composite Order...”2013
Full text
307
Fischlin, Marc.
2013
Table of Contents:
“...Personal Tributes -- Computational Number Theory -- Hardness of Cryptographic Assumptions -- Hardware Security -- Privacy and Security -- Application Security....”2013
Full text
308
Sako, Kazue.
2013
Table of Contents:
“...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...”2013
Full text
309
Sako, Kazue.
2013
Table of Contents:
“...Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash...”2013
Full text
311
Sahai, Amit.
2013
Table of Contents:
“... of new cryptographic problems -- Study of notions of security and relations among them -- Modeling and analysis of cryptographic algorithms -- Study of the complexity assumptions used in cryptography....”2013
Full text
312
Avoine, Gildas
2013
Table of Contents:
“... for Wireless Sensor Networks -- An adaptive security architecture for location privacy sensitive sensor network applications -- Cryptographic Protocols -- Secure & Lightweight Distance-Bounding -- Cryptanalysis and Improvement of a Provably Secure RFID Ownership...”2013
Full text
313
Abdalla, Michel
2013
Table of Contents:
“...Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. ....”2013
Full text
314
315
Table of Contents:
“...Introduction -- Communication in the presence of adversaries -- On the brink of a revolution -- The equivalent of a written signature -- Written proof -- Paper and state -- The Cryptographic imagination -- Epilogue....”
Full text
Full text
316
Manulis, Mark.
2012
Table of Contents:
“...Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory....”2012
Full text
317
318
319
320
Goswami, Diganta.
2012
Table of Contents:
“... System -- Cryptographic Analysis of a Type of Sequence Generators -- Certificate-Less On-Demand Public Key Management (CLPKM) for Self-organized MANETs -- Computationally Efficient Secure Access Control for Vehicular Ad Hoc Networks -- Tracking Insecure...”2012
Full text