Advances in Cryptology -- ASIACRYPT 2014

Advances in Cryptology -- ASIACRYPT 2014
-0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.
20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
 eBook
Sofort lieferbar | Lieferzeit: Sofort lieferbar

Unser bisheriger Preis:ORGPRICE: 74,96 €

Jetzt 74,95 €* eBook

Artikel-Nr:
9783662456118
Veröffentl:
2014
Einband:
eBook
Seiten:
574
Autor:
Palash Sarkar
eBook Typ:
PDF
eBook Format:
eBook
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
Cryptology and coding theory.- Authenticated encryption.- Symmetric key cryptanalysis.- Side channel analysis.- Hyperelliptic curve cryptography.- Factoring and discrete log.- Cryptanalysis.- Signatures.- Zero knowledge.- Encryption schemes.- Outsourcing and delegation.- Obfuscation.- Homomorphic cryptography.- Secret sharing.- Block ciphers and passwords.- Black-box separation.- Composability.- Multi-party computation.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.