Advances in Cryptology – ASIACRYPT 2016 -

Advances in Cryptology – ASIACRYPT 2016

22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II
Buch | Softcover
XXIV, 1055 Seiten
2016 | 1st ed. 2016
Springer Berlin (Verlag)
978-3-662-53889-0 (ISBN)
106,99 inkl. MwSt

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Mathematical Analysis.- AES and White-Box.- Hash Function; Randomness.- Authenticated Encryption.- Block Cipher.- SCA and Leakage Resilience.- Zero Knowledge.- Post Quantum Cryptography.- Provable Security.- Digital Signature.- Functional and Homomorphic Cryptography.- ABE and IBE.- Foundation.- Cryptographic Protocol.- Multi-Party Computation.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XXIV, 1055 p. 198 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte adaptive oblivious transfer • anonymity • Applications • authenticated encryption • biometric authentication • Computer Science • Concurrent zero-knowledge • conference proceedings • Cryptanalysis • data encryption • digital signature • Distributed Cryptography • error-tolerance • Hash Functions • Informatics • Informatik • key generation • Lightweight cryptography • Malware • post-quantum cryptography • provable security • public-key encryption • Quantum Cryptography • Research • RFID • signature • supersingular elliptic curves
ISBN-10 3-662-53889-X / 366253889X
ISBN-13 978-3-662-53889-0 / 9783662538890
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich