๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[Lecture Notes in Computer Science] Principles of Security and Trust Volume 7215 || Verified Indifferentiable Hashing into Elliptic Curves

โœ Scribed by Degano, Pierpaolo; Guttman, Joshua D.


Book ID
121017071
Publisher
Springer Berlin Heidelberg
Year
2012
Weight
373 KB
Category
Article
ISBN
3642286410

No coin nor oath required. For personal study only.


๐Ÿ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Info
โœ Boyd, Colin; Simpson, Leonie ๐Ÿ“‚ Article ๐Ÿ“… 2013 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ English โš– 280 KB

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized

[Lecture Notes in Computer Science] Fina
โœ Danezis, George; Dietrich, Sven; Sako, Kazue ๐Ÿ“‚ Article ๐Ÿ“… 2012 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 210 KB

This Book Contains The Revised Selected Papers Of The Second Workshop On Real-life Cryptographic Protocols And Standardization, Rlcps 2011, And The Second Workshop On Ethics In Computer Security Research, Wecsr 2011, Held In Conjunction With The 15th International Conference On Financial Cryptograph

[Lecture Notes in Computer Science] Comp
โœ Wang, Yuping; Cheung, Yiu-ming; Liu, Hailin ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Springer Berlin Heidelberg ๐ŸŒ German โš– 437 KB

The Refereed Post-proceedings Of The International Conference On Computational Intelligence And Security Are Presented In This Volume. The 116 Papers Were Submitted To Two Rounds Of Careful Review. Papers Cover Bio-inspired Computing, Evolutionary Computation, Learning Systems And Multi-agents, Cryp