Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an impor...
After two decades of research and development, elliptic curve cryptography now has widespread exp...
The third successful completion of the INDOCRYPT conference series marks the acceptance of the se...
Elliptic curves have been intensively studied in algebraicgeometry and number theory. In recent y...
The RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers Tra...
This book constitutes the proceedings of the 3rd International Conference on Cryptology and Infor...
After two decades of research and development, elliptic curve cryptography now has widespread exp...
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, h...
Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of Calif...
This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conf...
The theory of finite fields, whose origins can be traced back to the works of Gauss and Galois, h...
Elliptic curves have been intensively studied in algebraicgeometry and number theory. In recent y...