This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for ...
详细信息
ISBN:
(数字)9783540462972
ISBN:
(纸本)9783540530008
This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.
This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and codi...
详细信息
ISBN:
(数字)9783540680475
ISBN:
(纸本)9783540624943
This book constitutes the refereed proceedings of the International Workshop on Security Protocols held in Cambridge, UK, in April 1996, in the context of the special program on computer security, cryptology, and codingtheory at the Isaac Newton Institute.;The 17 revised full papers and one abstract included in the book were carefully selected. Among the topics addressed are several types of public key cryptosystems, digital cash, electronic commerce, digital signatures, and visual cryptography. Besides original theoretical results, the collection of papers show a strong applications-oriented component.
The Crypto ’95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Sc...
详细信息
ISBN:
(数字)9783540447504
ISBN:
(纸本)9783540602217
The Crypto ’95 conference was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer - ciety Technical Committee on Security and Privacy, and the Computer Science Department of the University of California, Santa Barbara. It took place at the University of California, Santa Barbara, from August 27-31, 1995. This was the fifteenth annual Crypto conference; all have been held at UCSB. For the second time, proceedings were available at the conference. The General Chair, Stafford Tavares, was responsible for local organization and registration. The Program Committee considered 151 papers and selected 36 for pres- tation. There were also two invited talks. Robert Morris, Sr. gave a talk on “Ways of Losing information,” which included some non-cryptographic means of leaking secrets that are often overlooked by cryptographers. The second talk, “Cryptography - Myths and Realities,” was given by Adi Shamir, this year’s IACR Distinguished Lecturer. Shamir is the second person to receive this honor, the first having been Gus Simmons at Crypto ’94. These proceedings contain revised versions of the 36 contributed talks. Each paper was sent to at least three members of the program committee for c- ments. Revisions were not checked on their scientific aspects. Some authors will write final versions of their papers for publication in refereed journals. Of course, the authors bear full responsibility for the contents of their papers.
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008. The book contains ...
详细信息
ISBN:
(数字)9783540850533
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008. The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis.
暂无评论