Languages
Malkin, Tal.
Overview
Works: | 1 works in 3 publications in 1 languages |
---|
Titles
Advances in Cryptology – CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III /
by:
Peikert, Chris.; SpringerLink (Online service); Malkin, Tal.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Advances in Cryptology – CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part II /
by:
SpringerLink (Online service); Malkin, Tal.; Peikert, Chris.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Advances in Cryptology – CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part I /
by:
Malkin, Tal.; SpringerLink (Online service); Peikert, Chris.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Theory of Cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II /
by:
Kushilevitz, Eyal.; SpringerLink (Online service); Malkin, Tal.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Theory of cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.. Part I /
by:
Kushilevitz, Eyal.; Malkin, Tal.; SpringerLink (Online service); Workshop on the Preservation of Stability under Discretization ((2001 :)
(Language materials, printed)
Theory of cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016 : proceedings.. Part II /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Malkin, Tal.; Kushilevitz, Eyal.
(Language materials, printed)
Advances in Cryptology – CRYPTO 2021 = 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part IV /
by:
SpringerLink (Online service); Malkin, Tal.; Peikert, Chris.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Applied cryptography and network security = 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015 : revised selected papers /
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Malkin, Tal.
(Language materials, printed)
Applied Cryptography and Network Security = 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers /
by:
Malkin, Tal.; Polychronakis, Michalis.; SpringerLink (Online service); Lewko, Allison.; Kolesnikov, Vladimir.
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Topics in cryptology : = CT-RSA 2008
by:
Workshop on the Preservation of Stability under Discretization ((2001 :); SpringerLink (Online service); Malkin, Tal.
(Language materials, printed)
Theory of Cryptography = 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I /
by:
Kushilevitz, Eyal.; Malkin, Tal.; SpringerLink (Online service)
(Language materials, printed)
, [http://id.loc.gov/vocabulary/relators/edt]
Show more
Fewer
Subjects
Computer science—Mathematics.
Computer organization.
Systems and Data Security.
Algorithm Analysis and Problem Complexity.
Data Encryption.
Cryptography
Computer Communication Networks.
Information theory.
Coding and Information Theory.
Theory of Computation.
Computer networks
Computer Science.
Computers and civilization.
Computer Systems Organization and Communication Networks.
Algorithms.
Management of Computing and Information Systems.
Computer communication systems.
Computer security
Information Systems and Communication Service.
Computers and Society.
Data encryption (Computer science).
Cryptology.
Coding theory.
Cloud computing
Computer science.
Management information systems.
Computers.
Discrete Mathematics in Computer Science.
Data encryption (Computer science)
Computer security.
Computation by Abstract Devices.
Mobile and Network Security.