Sökt på: johannes a. buchmann
totalt 30 träffar
Introduction to Public Key Infrastructures
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between …
Introduction to Quantum Algorithms
Quantum algorithms are among the most important, interesting, and promising innovations in information and communication technology. They pose a major threat to today's …
Introduction to Public Key Infrastructures
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between …
Introduction to Public Key Infrastructures
The introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between …
Privately and Publicly Verifiable Computing Techniques
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a …
Post-Quantum Cryptography
This book constitutes the refereed proceedings of the Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, held in Cincinnati, OH, USA, in October 2008. The …
Privately and Publicly Verifiable Computing Techniques
This book presents the first comprehensive overview of various verifiable computing techniques, which allow the computation of a function on outsourced data to be delegated to a …
Post-Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of …
Coding Theory, Cryptography and Related Areas
This book contains 23 contributions presented at the "e;International Conference on Coding Theory, Cryptography and Related Areas (ICCC)"e;, held in Guanajuato, Mexico, in …
Homomorphic Signature Schemes
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide …
Public Key Cryptography -- PKC 2012
This book constitutes the refereed proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography, PKC 2012, held in Darmstadt, Germany, in May …
Introduction to Cryptography
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, and so forth. Users therefore should not only …