Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology
Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
Seiten
2017
|
1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-61272-0 (ISBN)
Springer International Publishing (Verlag)
978-3-319-61272-0 (ISBN)
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.
The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.
Revisiting tradition.- Different paradigms.- Cryptofication.- Malicious cryptography.- Advances in cryptanalysis.- Primitives and features; cryptanalysis correspondence.
Erscheinungsdatum | 09.08.2017 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 573 p. 84 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 890 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Algorithms & Data Structures • Algorithms & data structures • anonymity • Applications • authentication • Computer Communication Networks • Computer Science • conference proceedings • Cryptanalysis • cryptographic protocols • cryptography • cypher implementation • data encryption • delegation of authorities • DES • Discrete Mathematics • Discrete mathematics in computer science • Informatics • information architecture • Intrusion Detection • Maintenance & repairs • Maintenance & repairs • management of computing and information systems • Maths for computer scientists • network hardware • privacy • Research • Rijndael attacks • rsa • Security Engineering • signature schemes • Systems Security • trust requirements |
ISBN-10 | 3-319-61272-7 / 3319612727 |
ISBN-13 | 978-3-319-61272-0 / 9783319612720 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €