Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Fast Software Encryption
  • Language: en
  • Pages: 426

Fast Software Encryption

This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.

Progress in Cryptology – INDOCRYPT 2022
  • Language: en
  • Pages: 725

Progress in Cryptology – INDOCRYPT 2022

The volume constitutes the proceedings of the 23rd International Conference on Cryptology, INDOCRYPT 2022, which was held during December 11–14, 2022. The conference took place in Kolkata, India.The 31 full papers included in this book were carefully reviewed and selected from 74 submissions. They were organized in topical sections as follows: symmetric key cryptology;protocols and implementation;cryptanalysis;boolean functions;quantum cryptography and cryptanalysis;post quantum cryptography

Fast Software Encryption
  • Language: en
  • Pages: 634

Fast Software Encryption

  • Type: Book
  • -
  • Published: 2015-04-22
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.

Advances in Cryptology - ASIACRYPT 2013
  • Language: en
  • Pages: 567

Advances in Cryptology - ASIACRYPT 2013

  • Type: Book
  • -
  • Published: 2013-11-23
  • -
  • Publisher: Springer

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Cryptographic Hardware and Embedded Systems -- CHES 2011
  • Language: en
  • Pages: 537

Cryptographic Hardware and Embedded Systems -- CHES 2011

This book constitutes the proceedings of the 13th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2011, held in Nara, Japan, from September 28 until October 1, 2011. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections named: FPGA implementation; AES; elliptic curve cryptosystems; lattices; side channel attacks; fault attacks; lightweight symmetric algorithms, PUFs; public-key cryptosystems; and hash functions.

Information Security and Privacy
  • Language: en
  • Pages: 472

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2012-07-04
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Selected Areas in Cryptography – SAC 2019
  • Language: en
  • Pages: 715

Selected Areas in Cryptography – SAC 2019

This book contains revised selected papers from the 26th International Conference on Selected Areas in Cryptography, SAC 2019, held in Waterloo, ON, Canada, in August 2019. The 26 full papers presented in this volume were carefully reviewed and selected from 74 submissions. They cover the following research areas: Design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, cryptography for the Internet of Things.

Information Security and Privacy
  • Language: en
  • Pages: 471

Information Security and Privacy

  • Type: Book
  • -
  • Published: 2017-05-26
  • -
  • Publisher: Springer

The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.

Selected Areas in Cryptography
  • Language: en
  • Pages: 418

Selected Areas in Cryptography

  • Type: Book
  • -
  • Published: 2013-01-03
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.

Advances in Information and Computer Security
  • Language: en
  • Pages: 412

Advances in Information and Computer Security

  • Type: Book
  • -
  • Published: 2019-08-07
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 14th International Workshop on Security, IWSEC 2019, held in Tokyo, Japan, in August 2019. The 18 regular papers and 5 short papers presented in this volume were carefully reviewed and selected from 61 submissions. They were organized in topical sections named: Public-Key Primitives; Cryptanalysis on Public-Key Primitives; Cryptographic Protocols; Symmetric-Key Primitives; Malware Detection and Classification; Intrusion Detection and Prevention; Web and Usable Security; Cryptanalysis on Symmetric-Key Primitives; and Forensics.