Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Smart Card Research and Advanced Applications
  • Language: en
  • Pages: 303

Smart Card Research and Advanced Applications

This book constitutes the refereed proceedings of the 8th International Conference on Smart Card Research and Advanced Applications, CARDIS 2008, held in London, UK, in September 2008. The 21 revised full papers presented, together with the abstract of one invited talk, were carefully reviewed and selected from 51 submissions. The papers deal with the various issues related to the use of small electronic tokens in the process of human-machine interactions. The conference scopes include numerous subfields such as networking, efficient implementations, physical security, biometrics, etc.

Information Security and Assurance
  • Language: en
  • Pages: 418

Information Security and Assurance

This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.

Identity-based Cryptography
  • Language: en
  • Pages: 272

Identity-based Cryptography

  • Type: Book
  • -
  • Published: 2009
  • -
  • Publisher: IOS Press

"What if your public key was not some random-looking bit string, but simply your name or email address? This idea, put forward by Adi Shamir back in 1984, still keeps cryptographers busy today. Some cryptographic primitives, like signatures, were easily adapted to this new "identity-based" setting, but for others, including encryption, it was not until recently that the first practical solutions were found. The advent of pairings to cryptography caused a boom in the current state-of-the-art is this active subfield from the mathematical background of pairing and the main cryptographic constructions to software and hardware implementation issues. This volume bundles fourteen contributed chapters written by experts in the field, and is suitable for a wide audience of scientists, grad students, and implementors alike." --Book Jacket.

Provable Security
  • Language: en
  • Pages: 288

Provable Security

This book constitutes the proceedings of the 4th provable security conference held in Malacca, Malaysia in October 2010. The 17 papers presented were carefully reviewed and selected from 47 submissions. The papers are divided in topical sections on identification, auto proofs, signature, hash function, protocol, encryption, and signcryption.

Information Security and Cryptology
  • Language: en
  • Pages: 536

Information Security and Cryptology

  • Type: Book
  • -
  • Published: 2011-07-08
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.

Advances in Cryptology - ASIACRYPT 2009
  • Language: en
  • Pages: 735

Advances in Cryptology - ASIACRYPT 2009

  • Type: Book
  • -
  • Published: 2009-12-01
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.

Public Key Cryptography - PKC 2010
  • Language: en
  • Pages: 530

Public Key Cryptography - PKC 2010

This book constitutes the refereed proceedings of the 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, held in Paris, France, in May 2010. The 29 revised full papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on encryption; cryptanalysis; protocols; network coding; tools; elliptic curves; lossy trapdoor functions; discrete logarithm; and signatures.

Advances in Cryptology - ASIACRYPT 2010
  • Language: en
  • Pages: 646

Advances in Cryptology - ASIACRYPT 2010

  • Type: Book
  • -
  • Published: 2010-12-02
  • -
  • Publisher: Springer

Annotation. This book constitutes the refereed proceedings of the 16th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2010, held in Singapore, in December 2010. The 35 revised full papers presented were carefully reviewed and selected from 216 submissions. The papers are organized in topical sections on hash attacks; symmetric-key cryptosystems; block and stream ciphers; protocols; key exchange; foundation; zero-knowledge; lattice-based cryptography; secure communication and computation; models, notions, and assumptions; and public-key encryption.

Progress in Cryptology - LATINCRYPT 2010
  • Language: en
  • Pages: 333

Progress in Cryptology - LATINCRYPT 2010

  • Type: Book
  • -
  • Published: 2010-07-30
  • -
  • Publisher: Springer

This book constitutes the proceedings of the First International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2010, held in Puebla, Mexico, on August 8-11, 2010. The 19 papers presented together with four invited talks were carefully reviewed and selected from 62 submissions. The topics covered are encryption, elliptic curves, implementation of pairings, implementation of cryptographic algorithms, cryptographic protocols and foundations, cryptanalysis of symmetric primitives, post-quantum cryptography, and side-channel attacks.

Arithmetic of Finite Fields
  • Language: en
  • Pages: 214

Arithmetic of Finite Fields

  • Type: Book
  • -
  • Published: 2015-02-21
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 5th International Workshop on the Arithmetic of Finite Field, WAIFI 2014, held in Gebze, Turkey, in September 2014. The 9 revised full papers and 43 invited talks presented were carefully reviewed and selected from 27 submissions. This workshop is a forum of mathematicians, computer scientists, engineers and physicists performing research on finite field arithmetic, interested in communicating the advances in the theory, applications, and implementations of finite fields. The workshop will help to bridge the gap between the mathematical theory of finite fields and their hardware/software implementations and technical applications.