Lecture Notes in Computer Science

Results: 278



#Item
51Cryptography / Disk encryption theory / Block cipher / Feistel cipher / Malleability / Advantage / Ciphertext indistinguishability

The proceedings version of this paper [15] appears in Advances in Cryptology — CRYPTO ’03, Lecture Notes in Computer Science, vol. 2729, D. Boneh, ed., Springer-Verlag, 2003. This is the full version. A Tweakable Enc

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2003-08-29 18:48:22
52LaTeX / Lecture Notes in Computer Science / BibTeX / TeX / Search engine indexing / Portable Document Format

Lecture Notes in Computer Science: Authors’ Instructions for the Preparation of Camera-Ready Contributions to LNCS/LNAI/LNBI Proceedings Alfred Hofmann? , Ursula Barth, Ingrid Haas, Frank Holzwarth, Anna Kramer, Leonie

Add to Reading List

Source URL: www.setit.rnu.tn

Language: English - Date: 2016-04-12 08:27:38
53Algorithmic Number Theory Symposium / Computational number theory / Lecture Notes in Computer Science

KogWis 2016 Doctoral Symposium: Call for Participation The Doctoral Symposium at KogWis 2016 is a forum for Ph.D. students to discuss their objectives and recent work with a panel of experienced researchers working in th

Add to Reading List

Source URL: spatialintelligence.org

Language: English - Date: 2016-06-22 22:05:53
54Pseudorandom permutation / Advanced Encryption Standard / Ciphertext stealing / Data Encryption Standard / RSA / Advantage / Parity of a permutation / Block cipher / GOST

A preliminary version of this paper appears in Fast Software Encryption - FSE 2007, Lecture Notes in Computer Science Vol. ???, pp. ?-?, ??? eds., Springer-Verlag, 2007. This is the full version. How to Enrich the Messag

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-03-26 17:44:21
55Copyright law / Intellectual property law / Springer Science+Business Media / Copyright law of the United States / Copyright transfer agreement / Copyright notice / Copyright

Consent to Publish 123 Lecture Notes in Computer Science

Add to Reading List

Source URL: agi-conf.org

Language: English - Date: 2011-05-24 08:22:41
56Copyright law of the United States / Copyright / Springer Science+Business Media

123 Consent to Publish Lecture Notes in Computer Science Title of the Book or Conference Name: The

Add to Reading List

Source URL: www.mobiwis.org

Language: English - Date: 2016-05-30 06:25:22
57Lecture Notes in Computer Science / Springer Science+Business Media / Model checking

Selected Publications by Markus Roggenbach Journals 1. F G Moller, H N Nguyen, M Roggenbach: Simulating Timed CSP, 20 pages, submitted. 2. S Chadwick, J Clarke, A Iliasov, Y Isobe, P James, F Moller, M Roggenbach, A Roma

Add to Reading List

Source URL: www.cs.swan.ac.uk

Language: English - Date: 2012-05-05 08:21:17
58Risk / Actuarial science / Security / Disaster preparedness / Risk management / Vulnerability assessment / Social vulnerability / Disaster risk reduction / Threat / Emergency management / Disaster / Hazard

Lecture Notes in Computer Science:

Add to Reading List

Source URL: www.codata-germany.org

Language: English - Date: 2014-06-10 04:46:05
59

Lecture Notes in Computer Science:

Add to Reading List

Source URL: horst-kremers.de

Language: German - Date: 2016-02-17 07:02:00
    60

    Publication List of Tor Helleseth up to 2012 Edited Books, Proceedings and Journal Special Issues [1] T. Helleseth, Ed., Advances in Cryptology - EUROCRYPT ’93, ser. Lecture Notes in Computer Science, volBerlin:

    Add to Reading List

    Source URL: www.ii.uib.no

    Language: English - Date: 2013-01-10 07:04:16
      UPDATE