skip to content

International Association for Cryptologic Research

Overview
Works: 223 works in 612 publications in 1 language and 16,866 library holdings
Genres: Conference papers and proceedings  Periodicals 
Roles: isb, rpy, Publisher, Editor, Organizer of meeting, Other, Sponsor
Publication Timeline
Key
Publications about International Association for Cryptologic Research
Publications by International Association for Cryptologic Research
Most widely held works about International Association for Cryptologic Research
 
Most widely held works by International Association for Cryptologic Research
Proceedings, 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7-9, 1990, Oakland, California by IEEE Computer Society( Book )
36 editions published between 1990 and 2002 in English and held by 274 libraries worldwide
Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings by A. J Menezes( Book )
15 editions published in 2007 in English and held by 226 libraries worldwide
Annotation This book constitutes the refereed proceedings of the 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2007, held in Barcelona, Spain in May 2007. The 33 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications
Advances in cryptology--EUROCRYPT '87 : Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, the Netherlands, April 13-15, 1987 : proceedings by David Chaum( Book )
13 editions published in 1988 in English and held by 215 libraries worldwide
This book contains the proceedings of the EUROCRYPT '87 conference, a workshop on theory and applications of cryptographic techniques held at Amsterdam, April 1987. 26 papers were selected from over twice that number submitted to the program committee. The authors come from Europe, North America, and Japan and represent some of the leading research groups working in the fields of cryptography and data security. The subjects covered include sequences and linear complexity; hardware considerations, including random sources, physical security, and cryptographic algorithm implementation; topics in public key cryptography; authentication and secure transactions; hash functions and signatures; and the theory and application of symmetric ciphers
Proceedings, 1998 IEEE Symposium on Security and Privacy : May 3-6, 1998, Oakland, California, U.S.A. by Symposium on Security and Privacy( Book )
19 editions published between 1988 and 1998 in English and held by 129 libraries worldwide
Advances in cryptology - CRYPTO 2006 : 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006 : proceedings by Cynthia Dwork( Book )
7 editions published in 2006 in English and held by 118 libraries worldwide
Annotation
Advances in cryptology : ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005 : proceedings by Bimal Roy( Book )
6 editions published in 2005 in English and held by 118 libraries worldwide
This book constitutes the refereed proceedings of the 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, held in Chennai, India in December 2005. The 37 revised full papers presented were carefully reviewed and selected from 237 submissions. The papers are organized in topical sections on algebra and number theory, multiparty computation, zero knowledge and secret sharing, information and quantum theory, privacy and anonymity, cryptanalytic techniques, stream cipher cryptanalysis, block ciphers and hash functions, bilinear maps, key agreement, provable security, and digital signatures
Fast software encryption : 13th international workshop, FSE 2006, Graz, Austria, March 15-17, 2006 : revised selected papers by Matt J. B Robshaw( Book )
6 editions published in 2006 in English and held by 113 libraries worldwide
Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored for the last?ve years by the International Association for Cryptologic Research (IACR), and previous FSE workshops have been held around the world: 1993 Cambridge, UK 1994 Leuven, Belgium 1996 Cambridge, UK 1997 Haifa, Israel 1998 Paris, France 1999 Rome, Italy 2000 New York, USA 2001 Yokohama, Japan 2002 Leuven, Belgium 2003 Lund, Sweden 2004 New Delhi, India 2005 Paris, France The FSE workshop is devoted to research on fast and secure primitives for symmetric cryptography, including the design and analysis of block ciphers, stream ciphers, encryption schemes, analysis and evaluation tools, hash fu- tions, and message authentication codes. This year more than 100 papers were submitted to FSE for the?rst time. After an extensive review by the ProgramCommittee, 27 papers were presented at the workshop. Of course, the programwould not have been complete without the invited speaker, and the presentation by Eli Biham on the early history of di?erential cryptanalysis was particularly appreciated by workshop attendees
Advances in cryptology -- EUROCRYPT 2005 : 24th annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005 : proceedings by Ronald Cramer( Book )
6 editions published in 2005 in English and held by 112 libraries worldwide
"These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research, this year in cooperation with the Computer Science Department of the University of Aarhus, Denmark."
Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007 : proceedings by Salil Vadhan( Book )
4 editions published in 2007 in English and held by 100 libraries worldwide
This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers presented were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment
Cryptology and network security : 4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings by Feng Bao( Book )
5 editions published in 2007 in English and held by 79 libraries worldwide
This book constitutes the refereed proceedings of the 4th International Conference on Cryptology and Network Security, CANS 2005, held in Xiamen, China in December 2005. The 28 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on cryptanalysis, intrusion detection and viruses, authentication and signature, signcryption, e-mail security, cryptosystems, privacy and tracing, information hiding, firewalls, denial of service and DNS security, and trust management
Public key cryptography : PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 : proceedings by Tatsuaki Okamoto( Book )
6 editions published in 2007 in English and held by 78 libraries worldwide
This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007. The 29 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure
Advances in cryptology-- ASIACRYPT 2006 : 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006 ; proceedings by Xuejia Lai( Book )
4 editions published in 2006 in English and held by 61 libraries worldwide
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, held in Shanghai, China in December 2006. The 30 revised full papers presented were carefully reviewed and selected from 314 submissions. The papers are organized in topical sections on attacks on hash functions, stream ciphers and boolean functions, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures
Cryptographic ahrdware and embedded systems : CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008 : proceedings by Unknown( Book )
3 editions published in 2008 in English and held by 45 libraries worldwide
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded Systems, CHES 2008, held in Washington, D.C., USA, during August 10-13, 2008. The book contains 2 invited talks and 27 revised full papers which were carefully reviewed and selected from 107 submissions. The papers are organized in topical sections on side channel analysis, implementations, fault analysis, random number generation, and cryptography and cryptanalysis
Advances in Cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings by Antoine Joux( Book )
6 editions published in 2009 in English and held by 7 libraries worldwide
This book constitutes the refereed proceedings of the 29th Annual International Cryptology Conference, CRYPTO 2009, held in Santa Barbara, CA, USA in August 2009. The 38 revised full papers presented were carefully reviewed and selected from 213 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on key leakage, hash-function cryptanalysis, privacy and anonymity, interactive proofs and zero-knowledge, block-cipher cryptanalysis, modes of operation, elliptic curves, cryptographic hardness, merkle puzzles, cryptography in the physical world, attacks on signature schemes, secret sharing and secure computation, cryptography and game-theory, cryptography and lattices, identity-based encryption and cryptographers' toolbox
Advances in cryptology - CRYPTO 2008 : 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008 ; proceedings by David Hutchison( Book )
4 editions published in 2008 in English and held by 7 libraries worldwide
Annotation This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer
Advances in Cryptology - CRYPTO 2013 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part II by Ran Canetti( file )
5 editions published in 2013 in English and held by 0 libraries worldwide
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed proceedings of the 33rd Annual International Cryptology Conference, CRYPTO 2013, held in Santa Barbara, CA, USA, in August 2013. The 61 revised full papers presented in LNCS 8042 and LNCS 8043 were carefully reviewed and selected from numerous submissions. Two abstracts of the invited talks are also included in the proceedings. The papers are organized in topical sections on lattices and FHE; foundations of hardness; cryptanalysis; MPC - new directions; leakage resilience; symmetric encryption and PRFs; key exchange; multi linear maps; ideal ciphers; implementation-oriented protocols; number-theoretic hardness; MPC - foundations; codes and secret sharing; signatures and authentication; quantum security; new primitives; and functional encryption
Public key cryptography - PKC 2010 : 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010 : proceedings by Phong Q Nguyen( file )
3 editions published in 2010 in English and held by 0 libraries worldwide
Annotation
 
moreShow More Titles
fewerShow Fewer Titles
Alternative Names
I.A.C.R
IACR
IACR (International Association for Cryptologic Research)
International Association of Cryptographic Research
International Association of Cryptologic Research
International Association of Cryptology Research
האגודה הבינלאומית למחקר קריפטוגרפי
国际密码学研究协会
国際暗号学会
Languages
English (175)
Covers
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.