Linked e-resources
Details
Table of Contents
Outsourced Computation and Searchable Encryption
Symmetric Key Cryptography and Format Preserving Encryption
Fault Attacks and Hash Functions
Post Quantum Cryptography
Asymmetric Key Cryptography and Cryptanalysis
Symmetric Key Cryptanalysis
Theory
Secure Computations and Protocols.
Symmetric Key Cryptography and Format Preserving Encryption
Fault Attacks and Hash Functions
Post Quantum Cryptography
Asymmetric Key Cryptography and Cryptanalysis
Symmetric Key Cryptanalysis
Theory
Secure Computations and Protocols.