Advances in Cryptology – ASIACRYPT 2017

23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – ASIACRYPT 2017 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319707006
Publisher: Springer International Publishing Publication: November 22, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319707006
Publisher: Springer International Publishing
Publication: November 22, 2017
Imprint: Springer
Language: English

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.

The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.

The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

More books from Springer International Publishing

Cover of the book Information Fusion for Cyber-Security Analytics by
Cover of the book Radio Telescope Reflectors by
Cover of the book The Life Cycle of the Corpus Luteum by
Cover of the book Impact of Energy Balance on Cancer Disparities by
Cover of the book Animals and Science Education by
Cover of the book Bone and Cartilage Regeneration by
Cover of the book Information Retrieval Technology by
Cover of the book European Sexual Citizenship by
Cover of the book B Corp Entrepreneurs by
Cover of the book Evolutionary and Deterministic Methods for Design Optimization and Control With Applications to Industrial and Societal Problems by
Cover of the book African Perspectives of King Dingane kaSenzangakhona by
Cover of the book Proceedings of the Third International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’18) by
Cover of the book Informatics in Control, Automation and Robotics 12th International Conference, ICINCO 2015 Colmar, France, July 21-23, 2015 Revised Selected Papers by
Cover of the book Transport Across Natural and Modified Biological Membranes and its Implications in Physiology and Therapy by
Cover of the book Kierkegaard After the Genome by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy