Amazon cover image
Image from Amazon.com

Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology [electronic resource] : Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers /

Contributor(s): Material type: TextTextSeries: Security and Cryptology ; 10311Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XI, 573 p. 84 illus. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783319612737
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.824 23
LOC classification:
  • QA268
Online resources:
Contents:
Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence.
In: Springer Nature eBookSummary: This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence.

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in