On the Security of Tag-KEM for Signcryption
Electronic Notes in Theoretical Computer Science (ENTCS)
Design methods for security and trust
Proceedings of the conference on Design, automation and test in Europe
A survey of homomorphic encryption for nonspecialists
EURASIP Journal on Information Security
Can quantum mechanics help distributed computing?
ACM SIGACT News
Relaxed authenticity for data aggregation in wireless sensor networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
PSP: private and secure payment with RFID
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
A transformation from the Fibonacci to the Galois NLFSRs
IEEE Transactions on Information Theory
Voting with unconditional privacy by merging Prêt à voter and PunchScan
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
On the connection between signcryption and one-pass key establishment
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
How to speed-up your NLFSR-based stream cipher
Proceedings of the Conference on Design, Automation and Test in Europe
Efficient authentication for mobile and pervasive computing
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Bounds and trade-offs for Double-Base Number Systems
Information Processing Letters
E-MACs: towards more secure and more efficient constructions of secure channels
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
An asymmetric fingerprinting scheme based on tardos codes
IH'11 Proceedings of the 13th international conference on Information hiding
Using patterns to generate prime numbers
ICAPR'05 Proceedings of the Third international conference on Advances in Pattern Recognition - Volume Part I
Cryptanalysis of the niederreiter public key scheme based on GRS subcodes
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Bitwise higher order differential cryptanalysis
INTRUST'09 Proceedings of the First international conference on Trusted Systems
A formal definition and a new security mechanism of physical unclonable functions
MMB'12/DFT'12 Proceedings of the 16th international GI/ITG conference on Measurement, Modelling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
Authenticated encryption: how reordering can impact performance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
The social smart grid: Dealing with constrained energy resources through social coordination
Journal of Systems and Software
Hi-index | 0.06 |
Book DescriptionThis comprehensive encyclopedia provides easy access toinformation on all aspects of cryptography and security. With an AZformat of over 460 entries, 100+ international experts provide anaccessible reference for those seeking entry into any aspect of thebroad fields of cryptography and information security. Most entriesin this preeminent work include useful literature references,providing more than 2500 references in total. Topics for theencyclopedia were selected by a distinguished advisory boardconsisting of 18 of the worlds leading scholars and practitioners.Main subject areas include: Authentication and identification Blockciphers and stream ciphers Computational issues Copy protectionCryptanalysis and security Cryptographic protocols Electronicpayment and digital certificates Elliptic curve cryptographyFactorization algorithms and primality tests Hash functions andMACs Historical systems Identity-based cryptography Implementationaspects for smart cards and standards Key management Multipartycomputations like voting schemes Public key cryptography Quantumcryptography Secret sharing schemes Sequences Web security Thestyle of the entries in the Encyclopedia of Cryptography andSecurity is expository and tutorial rather than detailed andtechnical, making the book a practical resource for informationsecurity experts as well as professionals in other fields who needto access this vital information but who may not have time to worktheir way through an entire text on their topic of interest. Theunderlying concepts in information security can be difficult tounderstand and may even be counter-intuitive. The Encyclopedia ofCryptography and Security will become the premier reference work onthis complex subject.