Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings /
Progress in Cryptology – INDOCRYPT 2016 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings / [electronic resource] :
edited by Orr Dunkelman, Somitra Kumar Sanadhya.
- 1st ed. 2016.
- XVII, 429 p. 66 illus. online resource.
- Security and Cryptology, 10095 2946-1863 ; .
- Security and Cryptology, 10095 .
Public-Key Cryptography -- Cryptographic Protocols -- Side-Channel Attacks -- Implementation of Cryptographic Schemes -- Functional Encryption -- Symmetric-Key Cryptanalysis -- Foundations -- New Cryptographic Constructions.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
9783319498904
10.1007/978-3-319-49890-4 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Algorithms.
Electronic data processing--Management.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
Algorithms.
IT Operations.
Discrete Mathematics in Computer Science.
QA268
005.824
Public-Key Cryptography -- Cryptographic Protocols -- Side-Channel Attacks -- Implementation of Cryptographic Schemes -- Functional Encryption -- Symmetric-Key Cryptanalysis -- Foundations -- New Cryptographic Constructions.
This book constitutes the refereed proceedings of the 17th International Conference on Cryptology in India, INDOCRYPT 2016, held in Kolkata, India, in December 2016. The 23 revised full papers presented in this book were carefully reviewed and selected from 84 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
9783319498904
10.1007/978-3-319-49890-4 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Algorithms.
Electronic data processing--Management.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
Algorithms.
IT Operations.
Discrete Mathematics in Computer Science.
QA268
005.824