[23] Dan Boneh and David Mandell Freeman, "Homomorphic signatures for polynomial functions," in Advances in
Cryptology - Eurocrypt 2011, LNCS 6632, pp.
The main problem with learning
cryptology is its complexity and its foundation on complex mathematical principles and formulae.
Waters, "Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption," in Advances in
Cryptology: EUROCRYPT 2010, vol.
Segev, "Function-Private Subspace-Membership Encryption and Its Applications,
Cryptology ePrint Archive," Report 2013/403, 2013, http://eprint .iacr.org/2013/403.
van Heyst, "Group signatures," in Advances in
Cryptology: EUROCRYPT 1991, pp.
Stevens, who is a scientific staff member in the
cryptology group at CWI, analysed the rogue Microsoft certificate used by Flame's authors and determined that they used a different MD5 collision attack than the one devised by him and his colleagues in 2008.
In this book, he discovers
cryptology, examines tattoos, and learns to play the violin.
The centre will also be designed to enhance research capability in specified cyber technology areas, including networking security, mobility security,
cryptology, forensics and embedded devices such as industrial control systems.