FEEDBACK Smiley face
Normal view MARC view ISBD view

Selected Areas in Cryptography – SAC 2018 [electronic resource] :25th International Conference, Calgary, AB, Canada, August 15–17, 2018, Revised Selected Papers /

Contributor(s): Cid, Carlos [editor.] | Jacobson Jr., Michael J [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 11349Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XI, 499 p. 210 illus., 50 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030109707.Subject(s): Computer Science | Computer security | Data encryption (Computer science) | Computer networks -- Security measures | Computer Communication Networks | Computer science | Systems and Data Security | Cryptology | Mobile and Network Security | Security Services | Computer Communication Networks | Probability and Statistics in Computer ScienceOnline resources: Click here to access online In: Springer eBooksSummary: This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in