My Account Log in

1 option

Advances in Cryptology - ASIACRYPT 2017 : 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III / edited by Tsuyoshi Takagi, Thomas Peyrin.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Takagi, Tsuyoshi, Editor.
Peyrin, Thomas, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 10626
Security and Cryptology ; 10626
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Data protection.
Coding theory.
Information theory.
Electronic data processing-Management.
Computer science.
Computer science-Mathematics.
Cryptology.
Data and Information Security.
Coding and Information Theory.
IT Operations.
Theory of Computation.
Mathematics of Computing.
Local Subjects:
Cryptology.
Data and Information Security.
Coding and Information Theory.
IT Operations.
Theory of Computation.
Mathematics of Computing.
Physical Description:
1 online resource (XVIII, 473 pages) : 57 illustrations
Edition:
1st ed. 2017.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2017.
System Details:
text file PDF
Summary:
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017. The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Contents:
Cryptographic Protocols
Foundations
Zero-Knowledge Proofs
Symmetric Key Designs.
Other Format:
Printed edition:
ISBN:
978-3-319-70700-6
9783319707006
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account