This book constitutes the refereed proceedings of the Second International Workshop on Coding and...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key crypto...
The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydn...
This book constitutes the refereed proceedings of the Third International Workshop on Coding and ...
This volume contains the refereed proceedings of the Workshop on Cryptography and Computational N...
This book constitutes the refereed proceedings of the 6th International Conference on Cryptology ...
Over the past years, the rapid growth of the Internet and World Wide Web has provided great oppor...
This book constitutes the refereed proceedings of the 14th International Conference on Provable S...
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th...
The three-volume proceedings LNCS 12491, 12492, and 12493 constitutes the proceedings of the 26th...