Selected Areas in Cryptography - SAC 2015

22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Selected Areas in Cryptography - SAC 2015 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319313016
Publisher: Springer International Publishing Publication: March 17, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319313016
Publisher: Springer International Publishing
Publication: March 17, 2016
Imprint: Springer
Language: English

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. 

The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. 

The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

More books from Springer International Publishing

Cover of the book Raw Data by
Cover of the book Using Transparency Against Corruption in Public Procurement by
Cover of the book Interdisciplinary Topics in Applied Mathematics, Modeling and Computational Science by
Cover of the book Emotions and Reflexivity in Health & Social Care Field Research by
Cover of the book Birds as Useful Indicators of High Nature Value Farmlands by
Cover of the book Critical Theory and the Thought of Andrew Feenberg by
Cover of the book Algorithm Engineering by
Cover of the book The Ixodid Ticks (Acari: Ixodidae) of Southern Africa by
Cover of the book Brain-Computer Interface Research by
Cover of the book Prediction and Inference from Social Networks and Social Media by
Cover of the book Proceedings of the Symposium of Aeronautical and Aerospace Processes, Materials and Industrial Applications by
Cover of the book Failing States, Collapsing Systems by
Cover of the book The Optics of Giambattista Della Porta (ca. 1535–1615): A Reassessment by
Cover of the book Parenting and the State in Britain and Europe, c. 1870-1950 by
Cover of the book Customer Value Generation in Banking by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy