×

zbMATH — the first resource for mathematics

Found 307 Documents (Results 1–100)

100
MathJax
Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part II. Cham: Springer (ISBN 978-3-030-34620-1/pbk; 978-3-030-34621-8/ebook). Lecture Notes in Computer Science 11922, 121-150 (2019).
PDF BibTeX XML Cite
Full Text: DOI
Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer (ISBN 978-3-030-25509-1/pbk; 978-3-030-25510-7/ebook). Lecture Notes in Computer Science 11505, 103-115 (2019).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI
Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer (ISBN 978-3-030-16457-7/pbk; 978-3-030-16458-4/ebook). Lecture Notes in Computer Science 11445, 105-117 (2019).
PDF BibTeX XML Cite
Full Text: DOI
Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 25, 26 p. (2017).
PDF BibTeX XML Cite
Full Text: DOI
Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 323-346 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Barbero, Ángela I. (ed.) et al., Coding theory and applications. 5th international castle meeting, ICMCTA 2017, Vihula, Estonia, August 28–31, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10495, 139-153 (2017).
MSC:  94B60
PDF BibTeX XML Cite
Full Text: DOI
Fédou, Jean-Marc (ed.) et al., Random generation of combinatorial structures – GASCom 2016. Proceedings of the 10th GASCom conference, Centre IGESA, La Marana, Corsica, France, June 1 – June 4, 2016. Amsterdam: Elsevier. Electron. Notes Discrete Math. 59, 19-35 (2017).
MSC:  94B05 15A15 82B20
PDF BibTeX XML Cite
Full Text: DOI
Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 241-258 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
Canteaut, Anne (ed.) et al., Contemporary developments in finite fields and applications. Based on the presentations at the 12th international conference on finite fields and their applications (Fq12), Saratoga Springs, NY, July 13–17, 2015. Hackensack, NJ: World Scientific (ISBN 978-981-4719-25-4/hbk; 978-981-4719-27-8/ebook). 341-362 (2016).
MSC:  51E05 51E14 51E22
PDF BibTeX XML Cite
Full Text: DOI
Harsha, Prahladh (ed.) et al., 35th IARCS annual conference on foundations of software technology and theoretical computer science, FSTTCS 2015, Bangalore, India, December 16–18, 2015. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 45, 151-162 (2015).
MSC:  94B60 68W40 15B36
PDF BibTeX XML Cite
Full Text: DOI arXiv
Kyureghyan, Gohar (ed.) et al., Topics in finite fields. 11th international conference on finite fields and their applications (Fq11), Magdeburg, Germany, July 22–26, 2013. Proceedings. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 632, 229-251 (2015).
MSC:  94B05
PDF BibTeX XML Cite
Full Text: DOI
Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 23-42 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI
El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 314-330 (2015).
MSC:  94B35 82B20 94B05
PDF BibTeX XML Cite
Full Text: DOI
Howe, Everett W. (ed.) et al., ANTS X. Proceedings of the tenth algorithmic number theory symposium, San Diego, CA, USA, July 9–13, 2012. Berkeley, CA: Mathematical Sciences Publishers (MSP) (ISBN 978-1-935107-00-2/hbk; 978-1-935107-01-9/ebook). The Open Book Series 1, 271-293 (2013).
MSC:  11Y16 94A60 94B35
PDF BibTeX XML Cite
Full Text: arXiv
Alladi, Krishnaswami (ed.) et al., Quadratic and higher degree forms. New York, NY: Springer (ISBN 978-1-4614-7487-6/hbk; 978-1-4614-7488-3/ebook). Developments in Mathematics 31, 63-108 (2013).
PDF BibTeX XML Cite
Full Text: DOI arXiv
Woungang, Isaac (ed.) et al., Selected topics in information and coding theory. Hackensack, NJ: World Scientific (ISBN 978-981-283-716-5/hbk; 978-981-283-717-2/ebook). Series on Coding Theory and Cryptology 7, 41-76 (2010).
MSC:  94B12 94B60 94A60
PDF BibTeX XML Cite
Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 198-214 (2010).
MSC:  94A60 94B25 94C30
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type
Reviewing State
all top 5
Author
all top 5
Serial
all top 5
Year of Publication
all top 3
Classification
all top 3
Software