My Account Log in

1 option

Advances in Cryptology -- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II / edited by Palash Sarkar, Tetsu Iwata.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024)
Format:
Book
Contributor:
Sarkar, Palash, 1969- editor.
Iwata, Tetsu, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 8874.
Security and Cryptology ; 8874
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Coding theory.
Information theory.
Management information systems.
Computer science.
Computers.
Computer science--Mathematics.
Cryptology.
Systems and Data Security.
Coding and Information Theory.
Management of Computing and Information Systems.
Theory of Computation.
Mathematics of Computing.
Local Subjects:
Cryptology.
Systems and Data Security.
Coding and Information Theory.
Management of Computing and Information Systems.
Theory of Computation.
Mathematics of Computing.
Physical Description:
1 online resource (XXII, 528 pages) : 76 illustrations.
Edition:
First edition 2014.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014.
System Details:
text file PDF
Summary:
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
Contents:
Cryptology and coding theory
Authenticated encryption
Symmetric key cryptanalysis
Side channel analysis
Hyperelliptic curve cryptography
Factoring and discrete log
Cryptanalysis
Signatures
Zero knowledge
Encryption schemes
Outsourcing and delegation
Obfuscation
Homomorphic cryptography
Secret sharing
Block ciphers and passwords
Black-box separation
Composability
Multi-party computation.
Other Format:
Printed edition:
ISBN:
978-3-662-45608-8
9783662456088
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

We want your feedback!

Thanks for using the Penn Libraries new search tool. We encourage you to submit feedback as we continue to improve the site.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account