This book constitutes the proceedings of the 3rd International Conference on Cryptology and Infor...
The third successful completion of the INDOCRYPT conference series marks the acceptance of the se...
Elliptic curves have been intensively studied in algebraicgeometry and number theory. In recent...
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, h...
Invited Talks.- Sub-linear Queries Statistical Databases: Privacy with Power.- Malicious Cryptogr...
This volume gives the proceedings of Crypto '90, held in Calfornia in August 1990. The program pr...
After two decades of research and development, elliptic curve cryptography now has widespread exp...
Cryptanalysis I.- Practical Cryptanalysis of SFLASH.- Full Key-Recovery Attacks on HMAC NMAC-MD4 ...
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an impor...
After two decades of research and development, elliptic curve cryptography now has widespread exp...
Elliptic curves have been intensively studied in algebraicgeometry and number theory. In recent...
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, h...