TY - BOOK
AU - Sako,Kazue
AU - Sarkar,Palash
ED - SpringerLink (Online service)
TI - Advances in Cryptology - ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II
T2 - Lecture Notes in Computer Science,
SN - 9783642420450
AV - QA76.9.A25
U1 - 005.82 23
PY - 2013///
CY - Berlin, Heidelberg
PB - Springer Berlin Heidelberg, Imprint: Springer
KW - Computer science
KW - Computer security
KW - Data encryption (Computer science)
KW - Algorithms
KW - Mathematics
KW - Management information systems
KW - Applied mathematics
KW - Engineering mathematics
KW - Computer Science
KW - Data Encryption
KW - Algorithm Analysis and Problem Complexity
KW - Management of Computing and Information Systems
KW - Discrete Mathematics in Computer Science
KW - Systems and Data Security
KW - Applications of Mathematics
N1 - Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions
N2 - The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions
UR - http://dx.doi.org/10.1007/978-3-642-42045-0
ER -