Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

by Palash Sarkar, Tetsu Iwata
ISBN-10:
3662456109
ISBN-13:
9783662456101
Pub. Date:
10/24/2014
Publisher:
Springer Berlin Heidelberg
ISBN-10:
3662456109
ISBN-13:
9783662456101
Pub. Date:
10/24/2014
Publisher:
Springer Berlin Heidelberg
Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

by Palash Sarkar, Tetsu Iwata

Paperback

$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Product Details

ISBN-13: 9783662456101
Publisher: Springer Berlin Heidelberg
Publication date: 10/24/2014
Series: Lecture Notes in Computer Science , #8873
Edition description: 2014
Pages: 574
Product dimensions: 6.10(w) x 9.25(h) x 0.05(d)

Table of Contents

Cryptology and coding theory.- Authenticated encryption.- Symmetric key cryptanalysis.- Side channel analysis.- Hyperelliptic curve cryptography.- Factoring and discrete log.- Cryptanalysis.- Signatures.- Zero knowledge.- Encryption schemes.- Outsourcing and delegation.- Obfuscation.- Homomorphic cryptography.- Secret sharing.- Block ciphers and passwords.- Black-box separation.- Composability.- Multi-party computation.
From the B&N Reads Blog

Customer Reviews