This book constitutes the refereed proceedings of the 12th
International Conference on the Theory and Application of
Cryptology and Information Security, held in Shanghai, China,
December 2006. The 30 revised full papers cover attacks on hash
functions, stream ciphers, biometrics and ECC computation, id-based
schemes, public-key schemes, RSA and factorization, construction of
hash function, protocols, block ciphers, and signatures.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!