Advances in Cryptology -- ASIACRYPT 2014

20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

Palash Sarkar, Tetsu Iwata (Herausgeber)

Buch | Softcover
XX, 574 Seiten
2014 | 2014
Springer Berlin (Verlag)
978-3-662-45610-1 (ISBN)

Lese- und Medienproben

Advances in Cryptology -- ASIACRYPT 2014 -
53,49 inkl. MwSt
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Cryptology and coding theory.- Authenticated encryption.- Symmetric key cryptanalysis.- Side channel analysis.- Hyperelliptic curve cryptography.- Factoring and discrete log.- Cryptanalysis.- Signatures.- Zero knowledge.- Encryption schemes.- Outsourcing and delegation.- Obfuscation.- Homomorphic cryptography.- Secret sharing.- Block ciphers and passwords.- Black-box separation.- Composability.- Multi-party computation.

Erscheint lt. Verlag 14.11.2014
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XX, 574 p. 74 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 876 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte cryptanalysis and other attacks • cryptography • hardware attacks and countermeasures • information-theoretic techniques • Information Theory • Key Management • mathematical foundations of cryptography • Mathematics of Computing • public key (asymmetric) techniques • public key encryption • security in hardware • security services • software and application security • symmetric cryptography and hash functions
ISBN-10 3-662-45610-9 / 3662456109
ISBN-13 978-3-662-45610-1 / 9783662456101
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich