This book constitutes the thoroughly refereed post-conference proceedings of the First Australias...
Here is a highly relevant book that covers a wide array of key aspects in information security.Wi...
Boolean Functions.- Boolean Function Design Using Hill Climbing Methods.- Enumeration of Correlat...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australa...
This work presents recent developments in hashing algorithmdesign. Hashing is the process of crea...
The third International Workshop on Information Security was held at the U- versity of Wollongong...
This book constitutes the refereed proceedings of the 11th International Conference on Cryptology...
This book constitutes the refereed proceedings of the Second Australasian Conference on Informati...
Proceedings of AUSCRYPT '90, the first IACR-sponsored conference on cryptology to be held in Aust...
This book constitutes the refereed proceedings of the 14th International Conference on the Theory...
This book constitutes the refereed proceedings of the Third International Conference on Provable ...