You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communication of Korea.
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.
This book constitutes the refereed proceedings of the Third International Conference on Applied Cryptography and Network Security, ACNS 2005, held in New York, NY, USA in June 2005. The 35 revised full papers presented were carefully reviewed and selected from 158 submissions. Among the topics covered are authentication, key exchange protocols, network denial of service, digital signatures, public key cryptography, MACs, forensics, intrusion detection, secure channels, identity-based encryption, network security analysis, DES, key extraction, homomorphic encryption, and zero-knowledge arguments.
This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.
This volume contains the proceedings of the AMS Special Session on Discrete Geometry and Algebraic Combinatorics held on January 11, 2013, in San Diego, California. The collection of articles in this volume is devoted to packings of metric spaces and related questions, and contains new results as well as surveys of some areas of discrete geometry. This volume consists of papers on combinatorics of transportation polytopes, including results on the diameter of graphs of such polytopes; the generalized Steiner problem and related topics of the minimal fillings theory; a survey of distance graphs and graphs of diameters, and a group of papers on applications of algebraic combinatorics to packings of metric spaces including sphere packings and topics in coding theory. In particular, this volume presents a new approach to duality in sphere packing based on the Poisson summation formula, applications of semidefinite programming to spherical codes and equiangular lines, new results in list decoding of a family of algebraic codes, and constructions of bent and semi-bent functions.
This book constitutes the refereed proceedings of the 25th Annual International Cryptology Conference, CRYPTO 2005, held in Santa Barbara, California, USA in August 2005. The 33 revised full papers presented were carefully reviewed and selected from 178 submissions. The papers are organized in topical sections on hash functions, theory, cryptanalysis, zero knowledge, anonymity, privacy, broadcast encryption, human-oriented cryptography, secret sharing, multi-party computation, random oracles, information theoretic security, and primitives and protocols.
Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28 –30 2005, ...
This book constitutes the refereed proceedings of the 11th International Workshop on Fast Software Encryption, FSE 2004, held in Delhi, India in February 2004. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on algebraic attacks, stream cipher cryptanalysis, Boolean functions, stream cipher design, design and analysis of block ciphers, cryptographic primitives-theory, modes of operation, and analysis of MACs and hash functions.
This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in Prague, Czech Republic in May 1999. The 32 revised full papers presented were carefully selected during highly competitive reviewing process. The book is divided in topical sections on cryptanalysis, hash functions, foundations, public key cryptosystems, watermarking and fingerprinting, elliptic curves, new schemes, block ciphers, distributed cryptography, tools from related areas, and broadcast and multicast.