1
Published 2008
Table of Contents: ... Using Compiled Code -- Debugging Lazy Functional Programs by Asking the Oracle -- Uniqueness Typing...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ... Blind and Partially Blind Signatures Without Random Oracles -- Key Exchange Using Passwords and Long...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function...
View full text
Electronic eBook
4
Published 2010
Table of Contents: ...Signatures -- A New RSA-Based Signature Scheme -- Fair Blind Signatures without Random Oracles...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ...Invited Papers -- One Useful Logic That Defines Its Own Truth -- On Synchronous and Asynchronous...
View full text
Electronic eBook
6
Published 2007
Table of Contents: ... of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based...
View full text
Electronic eBook
7
Published 2010
Table of Contents: ... -- Generic Constructions of Parallel Key-Insulated Encryption -- Invited Talk -- Heuristics and Rigor...
View full text
Electronic eBook
8
Published 2006
Table of Contents: ... Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... in Computer Aided Design -- Software Framework for Modular Machine Learning Systems -- Parallel cost function...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
11
Published 2007
Table of Contents: ... of Experts for View-Independent Face Recognition -- Fusion of Support Vector Classifiers for Parallel Gabor...
View full text
Electronic eBook
12
Published 2015
Table of Contents: ... from Lossy Trapdoor Functions -- Attacking RSA with a Composed Decryption Exponent Using Unravelled...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... Normalization Tool Using Mathematica -- Symbolic Manipulation of Bspline Basis Functions with Mathematica...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... and Creativity -- Regular Papers -- Porting Decision Tree Algorithms to Multicore Using FastFlow...
View full text
Electronic eBook
15
Published 2006
Table of Contents: ... Application to Security Evaluation of the HB Protocols for RFID Authentication -- Hash Functions -- Update...
View full text
Electronic eBook
16
Published 2007
Table of Contents: ... -- A New Strategy for Finding a Differential Path of SHA-1 -- Preimage Attack on the Parallel FFT...
View full text
Electronic eBook
17
Published 2012
Table of Contents: ... Systems Using Soft Physical Hash Functions.- N-Victims: An Approach to Determine N-Victims for APT...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ... Density Attacks to Low-Weight Knapsacks -- Efficient and Secure Elliptic Curve Point Multiplication Using...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... -- Research Track -- Towards Parallel Non Serial Dynamic Programming for Solving Hard Weighted CSP -- Making...
View full text
Electronic eBook
20
Subjects: ...Programming Languages, Compilers, Interpreters. https://scigraph.springernature.com/ontologies...
View full text
Electronic eBook