Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319612737
Publisher: Springer International Publishing Publication: July 13, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319612737
Publisher: Springer International Publishing
Publication: July 13, 2017
Imprint: Springer
Language: English

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.

 

More books from Springer International Publishing

Cover of the book Advanced Technologies, Systems, and Applications II by
Cover of the book Bounds on the Effective Theory of Gravity in Models of Particle Physics and Cosmology by
Cover of the book Variable Structure Control of Complex Systems by
Cover of the book Radionuclides in the Environment by
Cover of the book Back-in-Time and Faster-than-Light Travel in General Relativity by
Cover of the book Advances in Ergonomics Modeling, Usability & Special Populations by
Cover of the book Advanced Computing in Industrial Mathematics by
Cover of the book System Level ESD Protection by
Cover of the book Mind, Brain and Technology by
Cover of the book Dance Notations and Robot Motion by
Cover of the book The Aesthetics of Democracy by
Cover of the book Evolving Business Models by
Cover of the book Human Dynamics Research in Smart and Connected Communities by
Cover of the book Acting to Manage Conflict and Bullying Through Evidence-Based Strategies by
Cover of the book Rickettsiales by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy