1
Table of Contents: ... -- BLAKE in Hardware -- Design Rationale -- Security of BLAKE -- BLAKE2 -- Conclusion -- References -- App...
View full text
Electronic eBook
2
by Gupur, Geni., Gupur, Geni.
Published 2011
Table of Contents: ...Preface -- C0-Semigroup of Linear Operators and Cauchy Problems -- Statement of the Problems...
View full text
Electronic eBook
3
..., in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP...
Article
4
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... Memory Authentication -- Database and System Security -- An Efficient PIR Construction Using Trusted...
View full text
Electronic eBook
6
Published 2010
Table of Contents: ...-Length Hashing -- Interpreting Hash Function Security Proofs -- Protocol -- Formal and Precise Analysis...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ...Software Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ...Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory...
View full text
Electronic eBook
9
Published 2007
Table of Contents: ...Theory of Security with Noisy Data -- Unbreakable Keys from Random Noise -- Fuzzy Commitment -- A...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... with Signature Verification on the Signcrypted Message -- Provably Secure Identity-Based Undeniable Signatures...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... in Location-Aware Applications -- Security of Direct Anonymous Authentication Using TPM 2.0 Signature...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ...Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems...
View full text
Electronic eBook
13
Published 2008
Table of Contents: ...Cryptosystems -- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings -- Hybrid Damgård...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Collisions and Hash Collisions -- Hash Functions -- On the Indifferentiability of the Grøstl Hash Function...
View full text
Electronic eBook
15
Published 2005
Table of Contents: ...Cryptanalysis -- The Second-Preimage Attack on MD4 -- On the Security of Certificateless Signature...
View full text
Electronic eBook
16
Published 2008
Table of Contents: ... Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A...
View full text
Electronic eBook
18
Published 2005
Table of Contents: ... Security -- Calibrating Entropy Functions Applied to Computer Networks -- A Passive External Web...
View full text
Electronic eBook
19
Published 2011
Subjects: ...Algorithm Analysis and Problem Complexity. https://scigraph.springernature.com/ontologies/product...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook