Advances in Cryptology – ASIACRYPT 2016

22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – ASIACRYPT 2016 by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662538876
Publisher: Springer Berlin Heidelberg Publication: November 14, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783662538876
Publisher: Springer Berlin Heidelberg
Publication: November 14, 2016
Imprint: Springer
Language: English

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.

The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

More books from Springer Berlin Heidelberg

Cover of the book PET and SPECT in Psychiatry by
Cover of the book Cervical Spine: Tricks and Traps by
Cover of the book Content Analysis of Verbal Behavior by
Cover of the book Internet, Economic Growth and Globalization by
Cover of the book Motion Vision by
Cover of the book Medical and Surgical Management of Tachyarrhythmias by
Cover of the book Innovation from Information Systems by
Cover of the book Behavioral Operations in Planning and Scheduling by
Cover of the book Materials Characterisation and Mechanism of Micro-Cutting in Ultra-Precision Diamond Turning by
Cover of the book Fiber-Optic Transmission Networks by
Cover of the book Age Determination of Young Rocks and Artifacts by
Cover of the book Biophysics by
Cover of the book Predictably Rational? by
Cover of the book Experimentalphysik 4 by
Cover of the book Desalination Concentrate Management by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy