This volume contains the refereed proceedings of the Workshop on Cryptography and Computational N...
Cryptanalysis.- The Second-Preimage Attack on MD4.- On the Security of Certificateless Signature ...
This book constitutes the refereed proceedings of the Second International Workshop on Coding and...
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydn...
This book constitutes the refereed proceedings of the 14th International Conference on Provable S...
Public Key Cryptography.- Incrementally Aggregatable Vector Commitments and Applications to Verif...
Best Paper Awards.- Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collis...
Multi-Party Computation.- MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication....
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of th...
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of th...
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of th...
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of th...