×

Found 25 Documents (Results 1–25)

Approaching optimal duplicate detection in a sliding window. (English) Zbl 07336095

Kim, Donghyun (ed.) et al., Computing and combinatorics. 26th international conference, COCOON 2020, Atlanta, GA, USA, August 29–31, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12273, 64-84 (2020).
MSC:  68Rxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

Information and communications security. 20th international conference, ICICS 2018, Lille, France, October 29–31, 2018. Proceedings. (English) Zbl 1398.68037

Lecture Notes in Computer Science 11149. Cham: Springer (ISBN 978-3-030-01949-5/pbk; 978-3-030-01950-1/ebook). xv, 818 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive provably secure attestations for arbitrary RSA prime generation algorithms. (English) Zbl 1500.94018

Foley, Simon N. (ed.) et al., Computer security – ESORICS 2017. 22nd European symposium on research in computer security, Oslo, Norway, September 11–15, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10492, 206-223 (2017).
MSC:  94A60 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Photonic power firewalls. (English) Zbl 1405.94061

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 342-354 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptology and network security. 14th international conference, CANS 2015, Marrakesh, Morocco, December 10–12, 2015. Proceedings. (English) Zbl 1325.68022

Lecture Notes in Computer Science 9476. Cham: Springer (ISBN 978-3-319-26822-4/pbk; 978-3-319-26823-1/ebook). x, 257 p. (2015).
PDFBibTeX XMLCite
Full Text: DOI

How to sign paper contracts? Conjectures and evidence related to equitable and efficient collaborative task scheduling. (English) Zbl 1314.68083

Koç, Çetin Kaya (ed.), Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18–20, 2013. Cham: Springer (ISBN 978-3-319-10682-3/hbk; 978-3-319-10683-0/ebook). 317-340 (2014).
MSC:  68M20
PDFBibTeX XMLCite
Full Text: DOI

Operand folding hardware multipliers. (English) Zbl 1301.68023

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 319-328 (2012).
MSC:  68M07
PDFBibTeX XMLCite
Full Text: DOI

Can a program reverse-engineer itself? (English) Zbl 1282.68098

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 1-9 (2011).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: DOI

Towards hardware-intrinsic security. Foundations and practice. Foreword by Pim Tuyls. (English) Zbl 1213.68157

Information Security and Cryptography. Texts and Monographs. Berlin: Springer (ISBN 978-3-642-14451-6/hbk; 978-3-642-14452-3/ebook). xvi, 407 p. (2010).
PDFBibTeX XMLCite
Full Text: DOI

Efficient rational secret sharing in standard communication networks. (English) Zbl 1274.94137

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 419-436 (2010).
MSC:  94A62 68M12
PDFBibTeX XMLCite
Full Text: DOI

How to disembed a program? (Extended abstract). (English) Zbl 1104.68469

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 441-454 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Applet verification strategies for RAM-constrained devices. (English) Zbl 1028.68524

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 118-137 (2003).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: Link

Reducing the memory complexity of type-inference algorithms. (English) Zbl 1023.68563

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 109-121 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Universal padding schemes for RSA. (English) Zbl 1026.94526

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 226-241 (2002).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14–16, 2001. Proceedings. (English) Zbl 0971.00042

Lecture Notes in Computer Science. 2162. Berlin: Springer. xiv, 411 p. (2001).
PDFBibTeX XMLCite
Full Text: DOI

How to improve an exponentiation black-box. (English) Zbl 0929.68050

Nyberg, Kaisa (ed.), Advances in Cryptology. International conference on the Theory and application of cryptographic techniques. Espoo, Finland, May 31 - June 4, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1403, 211-220 (1998).
MSC:  68P25 11Y16
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software