Search alternatives:
polysomics » polyomics, polyatomics, polysomes, holysomics
poly » holy
polye » holye, polyen, polya, polyp
polyyblend » holyyblend, polyblend, polyblends

1
Published 2017
Springer International Publishing
Table of Contents: ... encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves...

2
Published 2020
Springer International Publishing
Table of Contents: ...Invited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel...

3
Published 2021
Springer International Publishing
Table of Contents: ...AI Security -- Asymmetric Cipher -- Post-quantum Crypto -- System Security -- Privacy Protection...

4
Published 2019
Springer International Publishing
Table of Contents: ... -- Blockchain and Cryptocurrency -- Post Quantum Cryptography -- Public Key and Commitment -- Theory...

5
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... in a Broad Area -- PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution -- Cyber...

6
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Cipher Coprocessor Using WDDL and Wave-Pipelining -- OPMAC: One-Key Poly1305 MAC -- A General...

7
Published 2021
Springer International Publishing
...This book constitutes the post-conference proceedings of the 17th International Conference...

8
Published 2013
Springer Berlin Heidelberg
...This book constitutes the thoroughly refereed post-conference proceedings of the 8th International...

9
Published 2011
Springer Berlin Heidelberg
...This book constitutes the thoroughly refereed post-conference proceedings of the International...

10
Published 2018
Springer International Publishing
...This book constitutes the thoroughly refereed post-conference proceedings of the 13th International...

11
Published 2012
Springer Berlin Heidelberg
...This book constitutes the thoroughly refereed post-workshop proceedings of the 12th International...

12
Published 2011
Springer Berlin Heidelberg
...This book constitutes the thoroughly refereed post-conference proceedings of the 6th International...

13
Published 2017
Springer International Publishing
...This book constitutes the refereed post-conference proceedings of the Second International...

14
by Young, Adam, Yung, Moti
Published 2004
Wiley Publishing
Table of Contents: ...Through hacker's eyes -- Cryptovirology -- Tools for security and insecurity -- The two faces...

15
Published 2016
Springer International Publishing
...This book constitutes the thoroughly refereed post-conference proceedings of the 7th International...

16
Published 2019
Springer International Publishing
...This book constitutes the post-conference proceedings of the 14th International Conference...

17
Published 2014
Springer International Publishing
...This book constitutes the thoroughly refereed post-conference proceedings of the 9th International...

18
Published 2024
Springer Nature Singapore
Table of Contents: ... Communication -- CCA-secure Identity-Based Matchmaking Encryption from Standard Assumptions.-Post-Quantum Public...

19
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... Attacks -- Cryptography -- An Improved Poly1305 MAC -- Certificateless Public-Key Signature: Security...

20
Published 2016
Springer International Publishing
...This book constitutes the thoroughly refereed post-conference proceedings of the 11th International...