Selected Areas in Cryptography -- SAC 2014

21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Selected Areas in Cryptography -- SAC 2014 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319130514
Publisher: Springer International Publishing Publication: December 4, 2014
Imprint: Springer Language: English
Author:
ISBN: 9783319130514
Publisher: Springer International Publishing
Publication: December 4, 2014
Imprint: Springer
Language: English

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

More books from Springer International Publishing

Cover of the book Architecture, Urban Space and War by
Cover of the book Modeling, Methodologies and Tools for Molecular and Nano-scale Communications by
Cover of the book Patterns of Rationality by
Cover of the book Proceedings of 4th International Conference in Software Engineering for Defence Applications by
Cover of the book Metaheuristics for Production Systems by
Cover of the book Kenneth Warren and the Great Neglected Diseases of Mankind Programme by
Cover of the book Multiprocessor Scheduling for Real-Time Systems by
Cover of the book Handbook of Climate Change and Biodiversity by
Cover of the book Theory and Applications of Applied Electromagnetics by
Cover of the book Information Security Education Across the Curriculum by
Cover of the book A Diary of the Euro Crisis in Cyprus by
Cover of the book The Realization of Star Trek Technologies by
Cover of the book Multimedia Communications, Services and Security by
Cover of the book Mathematical Modelling of the Cell Cycle Stress Response by
Cover of the book Global Visions of Olof Palme, Bruno Kreisky and Willy Brandt by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy