[Lecture Notes in Computer Science] Principles of Security and Trust Volume 7215 || Verified Indifferentiable Hashing into Elliptic Curves
โ Scribed by Degano, Pierpaolo; Guttman, Joshua D.
- Book ID
- 121017071
- Publisher
- Springer Berlin Heidelberg
- Year
- 2012
- Weight
- 373 KB
- Category
- Article
- ISBN
- 3642286410
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized
This Book Contains The Revised Selected Papers Of The Second Workshop On Real-life Cryptographic Protocols And Standardization, Rlcps 2011, And The Second Workshop On Ethics In Computer Security Research, Wecsr 2011, Held In Conjunction With The 15th International Conference On Financial Cryptograph
The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp