1 option
Progress in Cryptology - INDOCRYPT 2018 : 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings / edited by Debrup Chakraborty, Tetsu Iwata.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 11356.
- Security and Cryptology ; 11356
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer security.
- Data mining.
- Data structures (Computer science).
- Software engineering.
- Cryptology.
- Systems and Data Security.
- Security Services.
- Data Mining and Knowledge Discovery.
- Data Structures and Information Theory.
- Software Engineering.
- Local Subjects:
- Cryptology.
- Systems and Data Security.
- Security Services.
- Data Mining and Knowledge Discovery.
- Data Structures and Information Theory.
- Software Engineering.
- Physical Description:
- 1 online resource (XXI, 399 pages) : 54 illustrations, 13 illustrations in color.
- Edition:
- First edition 2018.
- Contained In:
- Springer eBooks
- Place of Publication:
- Cham : Springer International Publishing : Imprint: Springer, 2018.
- System Details:
- text file PDF
- Summary:
- This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
- Contents:
- Outsourced Computation and Searchable Encryption
- Symmetric Key Cryptography and Format Preserving Encryption
- Fault Attacks and Hash Functions
- Post Quantum Cryptography
- Asymmetric Key Cryptography and Cryptanalysis
- Symmetric Key Cryptanalysis
- Theory
- Secure Computations and Protocols.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-030-05378-9
- 9783030053789
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.