Lecture Notes in Computer Science

Results: 278



#Item
231Espoo / Lecture Notes in Computer Science / University of Oulu / Oulu / Finland / Geography of Europe / Europe / Aalto University

International Workshop on Technologies and Services for Elderly (TSE 2011)

Add to Reading List

Source URL: www.aka.fi

Language: English - Date: 2011-03-10 09:08:12
232Copyright law of the United States / Information / Copyright / Royalties / Copyright law of Jordan / Intellectual property law / Law / Civil law

123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.dexa.org

Language: English - Date: 2014-05-15 09:41:17
233Knowledge / Lecture Notes in Computer Science / Systems theory / International Standard Serial Number / Information / Bernhard Thalheim / Science / Workshop on Logic /  Language /  Information and Computation / Dependency theory

Name: Sebastian Link August 2, 2010 Publications Completed Degrees

Add to Reading List

Source URL: slink.foiks.org

Language: English - Date: 2010-08-01 17:32:41
234Lecture Notes in Computer Science / Academic publishing / Algorithmic Number Theory Symposium / Springer Science+Business Media / Proceedings / Actor model / RIS / Index / Book / Publishing / Information science / Computing

Microsoft Word - SPLNPROC Author Instructions_June5.doc

Add to Reading List

Source URL: static.springer.com

Language: English - Date: 2014-06-05 07:41:05
235Formal sciences / Symposium on Foundations of Computer Science / International Colloquium on Automata /  Languages and Programming / Symposium on Theory of Computing / Silvio Micali / Lecture Notes in Computer Science / Entropic security / Computational learning theory / Quantum key distribution / Theoretical computer science / Cryptography / Applied mathematics

Adam Davison Smith +[removed] [removed] http://www.cse.psu.edu/˜asmith

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2014-06-12 11:22:23
236Differential cryptanalysis / Lecture Notes in Computer Science / Alternating step generator / Cipher / Summation generator / Cryptanalysis / LOKI / SAFER / International Data Encryption Algorithm / Cryptography / Block ciphers / Data Encryption Standard

Reference Papers [S1] Biryukov, Shamir, 展agner: Real Time Cryptanalysis of A5/1 on a PC, FSE2000 [S2] Canteaut, Filiol, 鼎iphertext Only Reconstruction of Stream Ciphers based on Combination Generator, FSE2000 [S3] Ch

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
237LOKI / Differential cryptanalysis / Alternating step generator / Summation generator / Lecture Notes in Computer Science / Cryptanalysis / Stream cipher / Cipher / SAFER / Cryptography / Block ciphers / Data Encryption Standard

Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-06-19 04:38:45
238Computing / Numbers / Boolean algebra / Binary arithmetic / Bitwise operation

To appear in E. Prouff, Ed., Constructive Side-Channel (COSADE 2014), Lecture Notes in Computer Science, Springer. Analysis and

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-30 13:17:52
239Cyberwarfare / RSA / Espionage / Paillier cryptosystem / Cipher / Security / Public-key cryptography / Cryptography / Chosen-ciphertext attack

Published in H. Krawczyk, Ed., Public Key Cryptography − PKC 2014, vol[removed]of Lecture Notes in Computer Science, pp. 592–610, Springer, 2014. Traceable Group Encryption Benoˆıt Libert1 , Moti Yung2 , Marc Joye1 ,

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-09 19:33:43
240Malleability / Cryptography / Symbol / Homomorphic encryption

Published in P. Q. Nguyen and E. Oswald, Eds, Advances in Cryptology − EUROCRYPT 2014, vol[removed]of Lecture Notes in Computer Science, pp[removed], Springer, 2014. Non-Malleability from Malleability: Simulation-Sound Q

Add to Reading List

Source URL: www.joye.site88.net

Language: English - Date: 2014-05-11 12:15:40
UPDATE