Yang Jisheng's Tombstone is the book that broke the silence on of one of history's most terrible ...
Thereare richtheories and designs for generalcontrolsystems,but usually, they will not lead to PI...
Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 20...
As the first wave of third-generation communication devices arrives, the technological and societ...
The lattice Boltzmann method (LBM) is a modern numerical technique, very efficient, flexible to s...
Functional encryption, commitments and proofs.- secure messaging and broadcast.
Cryptanalysis of post-quantum and public-key systems.- side-channels.- quantum random oracle model.
Homomorphic encryption.- encryption with special functionalities.- security proofs and security m...
Quantum cryptography.- key exchange.- symmetric-key design.
Post-quantum cryptography.
Secure Multi-party computation.- threshold cryptography.