Produktnummer:
187aad6ae3aeeb402eb057add2cf3ac2ad
Themengebiete: | cryptanalysis and other attacks cryptography hardware attacks and countermeasures information-theoretic techniques information theory key management mathematical foundations of cryptography mathematics of computing public key (asymmetric) techniques public key encryption |
---|---|
Veröffentlichungsdatum: | 14.11.2014 |
EAN: | 9783662456071 |
Sprache: | Englisch |
Seitenzahl: | 528 |
Produktart: | Kartoniert / Broschiert |
Herausgeber: | Iwata, Tetsu Sarkar, Palash |
Verlag: | Springer Berlin |
Untertitel: | 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II |
Produktinformationen "Advances in Cryptology -- ASIACRYPT 2014"
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Sie möchten lieber vor Ort einkaufen?
Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.
Juristische Fachbuchhandlung
Georg Blendl
Parcellistraße 5 (Maxburg)
8033 München
Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen