My Account Log in

1 option

Progress in Cryptology - INDOCRYPT 2018 : 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings / edited by Debrup Chakraborty, Tetsu Iwata.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Chakraborty, Debrup, editor.
Iwata, Tetsu, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 11356.
Security and Cryptology ; 11356
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer security.
Data mining.
Data structures (Computer science).
Software engineering.
Cryptology.
Systems and Data Security.
Security Services.
Data Mining and Knowledge Discovery.
Data Structures and Information Theory.
Software Engineering.
Local Subjects:
Cryptology.
Systems and Data Security.
Security Services.
Data Mining and Knowledge Discovery.
Data Structures and Information Theory.
Software Engineering.
Physical Description:
1 online resource (XXI, 399 pages) : 54 illustrations, 13 illustrations in color.
Edition:
First edition 2018.
Contained In:
Springer eBooks
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2018.
System Details:
text file PDF
Summary:
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
Contents:
Outsourced Computation and Searchable Encryption
Symmetric Key Cryptography and Format Preserving Encryption
Fault Attacks and Hash Functions
Post Quantum Cryptography
Asymmetric Key Cryptography and Cryptanalysis
Symmetric Key Cryptanalysis
Theory
Secure Computations and Protocols.
Other Format:
Printed edition:
ISBN:
978-3-030-05378-9
9783030053789
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account