FEEDBACK Smiley face
Normal view MARC view ISBD view

Selected Areas in Cryptography -- SAC 2014 [electronic resource] :21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers /

Contributor(s): Joux, Antoine [editor.] | Youssef, Amr [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 8781Publisher: Cham : Springer International Publishing : Imprint: Springer, 2014.Description: X, 381 p. 66 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319130514.Subject(s): Computer science | Computer security | Data encryption (Computer science) | Coding theory | Algorithms | Computer science -- Mathematics | Computer Science | Data Encryption | Systems and Data Security | Algorithm Analysis and Problem Complexity | Coding and Information Theory | Discrete Mathematics in Computer ScienceOnline resources: Click here to access online In: Springer eBooksSummary: This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in