Linked e-resources
Details
Table of Contents
Authentication and Key Establishment
Signatures with Advanced Properties
DoS Attacks and Network Anomaly Detection
Deterministic and Functional Encryption
Computing on Encrypted Data
Non-Interactive Proofs and PRFs
Symmetric Ciphers
Cryptography in Software
Security for Human Use.
Signatures with Advanced Properties
DoS Attacks and Network Anomaly Detection
Deterministic and Functional Encryption
Computing on Encrypted Data
Non-Interactive Proofs and PRFs
Symmetric Ciphers
Cryptography in Software
Security for Human Use.