03300nam a22006015i 4500
978-3-642-42045-0
DE-He213
20170515111842.0
cr nn 008mamaa
131123s2013 gw | s |||| 0|eng d
9783642420450
978-3-642-42045-0
10.1007/978-3-642-42045-0
doi
QA76.9.A25
URY
bicssc
COM053000
bisacsh
005.82
23
Advances in Cryptology - ASIACRYPT 2013
[electronic resource] :
19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II /
edited by Kazue Sako, Palash Sarkar.
Berlin, Heidelberg :
Springer Berlin Heidelberg :
Imprint: Springer,
2013.
XXIV, 542 p. 58 illus.
online resource.
text
txt
rdacontent
computer
c
rdamedia
online resource
cr
rdacarrier
text file
PDF
rda
Lecture Notes in Computer Science,
0302-9743 ;
8270
Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions.
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Computer science.
Computer security.
Data encryption (Computer science).
Algorithms.
Computer science
Mathematics.
Management information systems.
Applied mathematics.
Engineering mathematics.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Discrete Mathematics in Computer Science.
Systems and Data Security.
Applications of Mathematics.
Sako, Kazue.
editor.
Sarkar, Palash.
editor.
SpringerLink (Online service)
Springer eBooks
Printed edition:
9783642420443
Lecture Notes in Computer Science,
0302-9743 ;
8270
http://dx.doi.org/10.1007/978-3-642-42045-0
ZDB-2-SCS
ZDB-2-LNC
ddc
EB
Computer Science (Springer-11645)
21312
21312