Advances in Cryptology – ASIACRYPT 2016

22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – ASIACRYPT 2016 by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662538906
Publisher: Springer Berlin Heidelberg Publication: November 14, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783662538906
Publisher: Springer Berlin Heidelberg
Publication: November 14, 2016
Imprint: Springer
Language: English

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

More books from Springer Berlin Heidelberg

Cover of the book CSR und Retail Management by
Cover of the book Topics in Grammatical Inference by
Cover of the book Corporate Governance by
Cover of the book Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII by
Cover of the book Plate Deformation from Cradle to Grave by
Cover of the book Hand Bone Age by
Cover of the book Algebraic Modeling Systems by
Cover of the book Genetic Transformation of Plants by
Cover of the book Die Theorie, die nicht sterben wollte by
Cover of the book Space-Time Reference Systems by
Cover of the book Forschungsmethoden und Evaluation in den Sozial- und Humanwissenschaften by
Cover of the book Wie man Elementarteilchen entdeckt by
Cover of the book Produktivitätsmanagement von Dienstleistungen by
Cover of the book Pathologie by
Cover of the book Freeze-Etch Histology by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy