Limitar la búsqueda a ejemplares disponibles

Cubierta del libro

Título Advances in Cryptology – ASIACRYPT 2014 [electronic resource] : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II / edited by Palash Sarkar, Tetsu Iwata.

Descripción física XXII, 528 p. 76 illus. online resource.
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Colección Lecture Notes in Computer Science, 0302-9743 ; 8874
Springer eBooks. Computer Science
       Mostrar referencias similares
Lecture Notes in Computer Science, 0302-9743 ; 8874
       Mostrar referencias similares
Contiene: Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation.
Resumen: The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
Materia Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Computer science -- Mathematics.
Management information systems.
Computer Science.
       Mostrar referencias similares
Data Encryption.
       Mostrar referencias similares
Systems and Data Security.
       Mostrar referencias similares
Coding and Information Theory.
       Mostrar referencias similares
Management of Computing and Information Systems.
       Mostrar referencias similares
Theory of Computation.
       Mostrar referencias similares
Mathematics of Computing.
       Mostrar referencias similares
Autor secundario Sarkar, Palash. editor.
Iwata, Tetsu. editor.
SpringerLink (Online service)
En Springer eBooks
OTRO SOPORTE Printed edition: 9783662456071
ISBN 9783662456088 978-3-662-45608-8
ISBN/ISSN 10.1007/978-3-662-45608-8 doi