|
Showing 1 - 6 of
6 matches in All Departments
This book constitutes the refereed proceedings of the 19th
International Conference on Cryptology in India, INDOCRYPT 2018,
held in New Delhi, India, in December 2018. The 20 revised full
papers presented in this book were carefully reviewed and selected
from 60 submissions. The focus of the conference includes works on
outsourced computation and searchable encryption; symmetric key
cryptography and format preserving encryption; fault attacks and
Hash functions; post quantum cryptography; asymmetric key
cryptography and cryptanalysis; symmetric key cryptanalysis;
theory; and secure computations and protocols.
|
Advances in Cryptology -- ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Palash Sarkar, Tetsu Iwata
|
R3,181
Discovery Miles 31 810
|
Ships in 10 - 15 working days
|
The two-volume set LNCS 8873 and 8874 constitutes the refereed
proceedings of the 20th International Conference on the Theory and
Applications of Cryptology and Information Security, ASIACRYPT
2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised
full papers and two invited talks presented were carefully selected
from 255 submissions. They are organized in topical sections on
cryptology and coding theory; authenticated encryption; symmetric
key cryptanalysis; side channel analysis; hyperelliptic curve
cryptography; factoring and discrete log; cryptanalysis;
signatures; zero knowledge; encryption schemes; outsourcing and
delegation; obfuscation; homomorphic cryptography; secret sharing;
block ciphers and passwords; black-box separation; composability;
multi-party computation.
The two-volume set LNCS 8873 and 8874 constitutes the refereed
proceedings of the 20th International Conference on the Theory and
Applications of Cryptology and Information Security, ASIACRYPT
2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised
full papers and two invited talks presented were carefully selected
from 255 submissions. They are organized in topical sections on
cryptology and coding theory; authenticated encryption; symmetric
key cryptanalysis; side channel analysis; hyperelliptic curve
cryptography; factoring and discrete log; cryptanalysis;
signatures; zero knowledge; encryption schemes; outsourcing and
delegation; obfuscation; homomorphic cryptography; secret sharing;
block ciphers and passwords; black-box separation; composability;
multi-party computation.
This book constitutes the refereed proceedings of the 6th
International Workshop on Security, IWSEC 2011, held in Tokyo,
Japan, in November 2011. The 14 revised full papers presented in
this volume were carefully reviewed and selected from 45
submissions. They address all current issues in information and
computer security such as foundations of security, security in
networks and ubiquitous computing systems, and security in real
life applications. The papers are organized in topical sections on
software protection and reliability; cryptographic protocol;
pairing and identity based signature; malware detection;
mathematical and symmetric cryptography; public key encryption.
The two-volume set LNCS 9452 and 9453 constitutes the refereed
proceedings of the 21st International Conference on the Theory and
Applications of Cryptology and Information Security, ASIACRYPT
2015, held in Auckland, New Zealand, in November/December 2015. The
64 revised full papers and 3 invited talks presented were carefully
selected from 251 submissions. They are organized in topical
sections on indistinguishability obfuscation; PRFs and hashes;
discrete logarithms and number theory; signatures; multiparty
computation; public key encryption; ABE and IBE; zero-knowledge;
attacks on ASASA; number field sieve; hashes and MACs; symmetric
encryption; foundations; side-channel attacks; design of block
ciphers; authenticated encryption; symmetric analysis;
cryptanalysis; privacy and lattices.
The two-volume set LNCS 9452 and 9453 constitutes the refereed
proceedings of the 21st International Conference on the Theory and
Applications of Cryptology and Information Security, ASIACRYPT
2015, held in Auckland, New Zealand, in November/December 2015. The
64 revised full papers and 3 invited talks presented were carefully
selected from 251 submissions. They are organized in topical
sections on indistinguishability obfuscation; PRFs and hashes;
discrete logarithms and number theory; signatures; multiparty
computation; public key encryption; ABE and IBE; zero-knowledge;
attacks on ASASA; number field sieve; hashes and MACs; symmetric
encryption; foundations; side-channel attacks; design of block
ciphers; authenticated encryption; symmetric analysis;
cryptanalysis; privacy and lattices.
|
|