Advances in Cryptology -- ASIACRYPT 2015

21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology -- ASIACRYPT 2015 by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662487976
Publisher: Springer Berlin Heidelberg Publication: November 26, 2015
Imprint: Springer Language: English
Author:
ISBN: 9783662487976
Publisher: Springer Berlin Heidelberg
Publication: November 26, 2015
Imprint: Springer
Language: English

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.

The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.

More books from Springer Berlin Heidelberg

Cover of the book Chefsache IT by
Cover of the book Logistic Core Operations with SAP by
Cover of the book Study on Climate Change in Southwestern China by
Cover of the book Communication and Control for Networked Complex Systems by
Cover of the book Fluid Mechanics of Viscoplasticity by
Cover of the book Failure Management by
Cover of the book Building and Using Comparable Corpora by
Cover of the book Erfolgreich in die nächste Führungsposition by
Cover of the book Orogenic Andesites and Plate Tectonics by
Cover of the book The Stratosphere by
Cover of the book Bone Densitometry and Osteoporosis by
Cover of the book Strategic Management of Professional Service Firms by
Cover of the book Deterministic Extraction from Weak Random Sources by
Cover of the book Earth on the Edge: Science for a Sustainable Planet by
Cover of the book Simultaneous Statistical Inference by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy