My Account Log in

1 option

Advances in Cryptology - ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II / edited by Jung Hee Cheon, Tsuyoshi Takagi.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Cheon, Jung Hee, editor.
Takagi, Tsuyoshi, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10032.
Security and Cryptology ; 10032
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Coding theory.
Information theory.
Management information systems.
Computer science.
Computers.
Computer science--Mathematics.
Cryptology.
Systems and Data Security.
Coding and Information Theory.
Management of Computing and Information Systems.
Theory of Computation.
Mathematics of Computing.
Local Subjects:
Cryptology.
Systems and Data Security.
Coding and Information Theory.
Management of Computing and Information Systems.
Theory of Computation.
Mathematics of Computing.
Physical Description:
1 online resource (XXIV, 1055 pages) : 198 illustrations.
Edition:
First edition 2016.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2016.
System Details:
text file PDF
Summary:
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Contents:
Mathematical Analysis
AES and White-Box
Hash Function; Randomness
Authenticated Encryption
Block Cipher
SCA and Leakage Resilience
Zero Knowledge
Post Quantum Cryptography
Provable Security
Digital Signature
Functional and Homomorphic Cryptography
ABE and IBE
Foundation
Cryptographic Protocol
Multi-Party Computation.
Other Format:
Printed edition:
ISBN:
978-3-662-53890-6
9783662538906
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account