SIGN IN
SIGN UP
CCS
→
Security and privacy
→
Cryptography
Cryptography
Recent Papers
Switch to Flat View
Contact Us
Author Tools
Assign This CCS Concept
Generate CCS Codes
Key management
Public key (asymmetric) techniques
Symmetric cryptography and hash functions
Cryptanalysis and other attacks
Information-theoretic techniques
Mathematical foundations of cryptography
CCS 2012