You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Workshop on Fast Software Encryption, held in Lyngby, Denmark, in February 2011. The 22 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 106 initial submissions. The papers are organized in topical sections on differential cryptanalysis, hash functions, security and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis.
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on Information Security and Cryptology, held in Seoul, Korea, in December 2010. The 28 revised full papers presented were carefully selected from 99 submissions during two rounds of reviewing. The conference provides a forum for the presentation of new results in research, development, and applications in the field of information security and cryptology. The papers are organized in topical sections on cryptanalysis, cryptographic algorithms, implementation, network and mobile security, symmetric key cryptography, cryptographic protocols, and side channel attack.
This book is open access under a CC BY 4.0 license. CRISPR-Cas9 is a rapid, efficient, versatile and relatively cheap method for dissecting the molecular pathways that are the basis of life, as well as for investigating and potentially rectifying faults in these pathways that result in disease. This book reviews how CRISPR-Cas9 and other genome editing techniques are advancing our understanding of development and function in the nervous system, uncovering the molecular causes of neurological disorders and providing tools for gene therapy.
None
None