Yang Jisheng's Tombstone is the book that broke the silence on of one of history's most terrible ...
Workshop 1: International Workshop on Applications and Economics of Peer-to-Peer Systems (AEPP 20...
Thereare richtheories and designs for generalcontrolsystems,but usually, they will not lead to PI...
As the first wave of third-generation communication devices arrives, the technological and societ...
The lattice Boltzmann method (LBM) is a modern numerical technique, very efficient, flexible to s...
Functional encryption, commitments and proofs.- secure messaging and broadcast.
Cryptanalysis of post-quantum and public-key systems.- side-channels.- quantum random oracle model.
Homomorphic encryption.- encryption with special functionalities.- security proofs and security m...
Quantum cryptography.- key exchange.- symmetric-key design.
Post-quantum cryptography.
Secure Multi-party computation.- threshold cryptography.