×

Found 5 Documents (Results 1–5)

Legally fair contract signing without keystones. (English) Zbl 1346.94142

Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 175-190 (2016).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Autotomic signatures. (English) Zbl 1300.94113

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 143-155 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

How to disembed a program? (Extended abstract). (English) Zbl 1104.68469

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 441-454 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Computational alternatives to random number generators. (English) Zbl 0931.94049

Tavares, Stafford (ed.) et al., Selected areas in cryptography. 5th annual international workshop, SAC ’98. Kingston, Ontario, Canada, August 17–18, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1556, 72-80 (1999).
MSC:  94A60 94A62
PDFBibTeX XMLCite

Filter Results by …

Year of Publication

Main Field