|
Showing 1 - 8 of
8 matches in All Departments
This book constitutes the refereed post-conference proceedings of
the 5th International Conference on Cryptology and Information
Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba,
in September 2017. The 20 papers presented were carefully reviewed
and selected from 64 submissions. They are organized in the
following topical sections: security protocols; public-key
implementation; cryptanalysis; theory of symmetric-key
cryptography; multiparty computation and privacy; new
constructions; and adversarial cryptography.
FastSoftwareEncryption2009wasthe16thin a seriesofworkshopsonsymm-
ric key cryptography. Starting from 2002, it is sponsored by the
International Association for Cryptologic Research (IACR). FSE 2009
was held in Leuven, Belgium, after previous venues held in
Cambridge, UK (1993, 1996), Leuven, Belgium (1994, 2002), Haifa,
Israel (1997), Paris, France (1998, 2005), Rome, Italy (1999), New
York, USA (2000), Yokohama, Japan (2001), Lund, Sweden (2003), New
Delhi, India (2004), Graz, Austria (2006), Luxembourg, Lux- bourg
(2007), and Lausanne, Switzerland (2008). The workshop's main topic
is symmetric key cryptography, including the designoffast
andsecuresymmetrickeyprimitives,suchas block ciphers,stream
ciphers, hash functions, message authentication codes, modes of
operation and iteration, as well as the theoretical foundations of
these primitives. This year, 76 papers were submitted to FSE
including a large portion of papers on hash functions, following
the NIST SHA-3 competition, whose wo- shop was held just after FSE
in the same location. From the 76 papers, 24 were accepted for
presentation. It is my pleasure to thank all the authors of all s-
missions for the high-quality research, which is the base for the
scienti?c value of the workshop. The review process was thorough
(each submission received the attention of at least three
reviewers), and at the end, besides the accepted papers, the
Committee decided that the merits of the paper "Blockcipher-Based
Hashing Revisited" entitled the authors to receive the best paper
award. I wish to thank all Committee members and the referees for
their hard and dedicated work.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the
refereed proceedings of the 41st Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Eurocrypt
2022, which was held in Trondheim, Norway, during 30 May - 3 June,
2022. The 85 full papers included in these proceedings were
accepted from a total of 372 submissions. They were organized in
topical sections as follows: Part I: Best Paper Award; Secure
Multiparty Computation; Homomorphic Encryption; Obfuscation; Part
II: Cryptographic Protocols; Cryptographic Primitives; Real-World
Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks
and Masking, Post-Quantum Cryptography; Information-Theoretic
Security.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the
refereed proceedings of the 41st Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Eurocrypt
2022, which was held in Trondheim, Norway, during 30 May - 3 June,
2022. The 85 full papers included in these proceedings were
accepted from a total of 372 submissions. They were organized in
topical sections as follows: Part I: Best Paper Award; Secure
Multiparty Computation; Homomorphic Encryption; Obfuscation; Part
II: Cryptographic Protocols; Cryptographic Primitives; Real-World
Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks
and Masking, Post-Quantum Cryptography; Information-Theoretic
Security.
The 3-volume-set LNCS 13275, 13276 and 13277 constitutes the
refereed proceedings of the 41st Annual International Conference on
the Theory and Applications of Cryptographic Techniques, Eurocrypt
2022, which was held in Trondheim, Norway, during 30 May - 3 June,
2022. The 85 full papers included in these proceedings were
accepted from a total of 372 submissions. They were organized in
topical sections as follows: Part I: Best Paper Award; Secure
Multiparty Computation; Homomorphic Encryption; Obfuscation; Part
II: Cryptographic Protocols; Cryptographic Primitives; Real-World
Systems Part III: Symmetric-Key Cryptanalysis; Side Channel Attacks
and Masking, Post-Quantum Cryptography; Information-Theoretic
Security.
|
Selected Areas in Cryptography - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (Paperback, 1st ed. 2021)
Orr Dunkelman, Michael J. Jacobson, Jr., Colin O'flynn
|
R1,697
Discovery Miles 16 970
|
Ships in 10 - 15 working days
|
This book contains revised selected papers from the 27th
International Conference on Selected Areas in Cryptography, SAC
2020, held in Halifax, Nova Scotia, Canada in October 2020. The 27
full papers presented in this volume were carefully reviewed and
selected from 52 submissions. They cover the following research
areas: design and analysis of symmetric key primitives and
cryptosystems, including block and stream ciphers, hash functions,
MAC algorithms, and authenticated encryption schemes, efficient
implementations of symmetric and public key algorithms,
mathematical and algorithmic aspects of applied cryptology, and
secure elections and related cryptographic constructions
This book constitutes the refereed proceedings of the 17th
International Conference on Cryptology in India, INDOCRYPT 2016,
held in Kolkata, India, in December 2016. The 23 revised full
papers presented in this book were carefully reviewed and selected
from 84 submissions. The focus of the conference includes works on
Public-Key Cryptography, Cryptographic Protocols, Side-Channel
Attacks, Implementation of Cryptographic Schemes, Functional
Encryption, Symmetric-Key Cryptanalysis, Foundations, and New
Cryptographic Constructions.
This book contains revised selected papers from the 22nd
International Conference on Selected Areas in Cryptography, SAC
2015, held in Sackville, NB, Canada in August 2015. The 26 full
papers and 3 short papers presented in this volume were carefully
reviewed and selected from 91 submissions. They are organized in
topical sections named: privacy enhancing technologies;
cryptanalysis of symmetric-key primitives; implementation of
cryptographic schemes; short papers; privacy preserving data
processing; side channel attacks and defenses; new cryptographic
constructions; authenticated encryption; on the hardness of
mathematical problems; and cryptanalysis of authenticated
encryption schemes.
|
You may like...
The Show
Niall Horan
CD
R213
R185
Discovery Miles 1 850
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|