Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

5. AFRICACRYPT 2012: Ifrance, Morocco

Refine list

showing all ?? records

Signature Schemes

Stream Ciphers

Applications of Information Theory

Block Ciphers

Network Security Protocols

Public-Key Cryptography

Cryptanalysis of Hash Functions

Hash Functions: Design and Implementation

Algorithms for Public-Key Cryptography

Cryptographic Protocols

Invited Talks