Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319612737
Publisher: Springer International Publishing Publication: July 13, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319612737
Publisher: Springer International Publishing
Publication: July 13, 2017
Imprint: Springer
Language: English

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.

 

More books from Springer International Publishing

Cover of the book Computer and Information Science by
Cover of the book Dynamic Optimization by
Cover of the book Precision Molecular Pathology of Bladder Cancer by
Cover of the book Asymptotic Approximations for the Sound Generated by Aerofoils in Unsteady Subsonic Flows by
Cover of the book Neighbourhood Watch in a Digital Age by
Cover of the book The Short-Run Approach to Long-Run Equilibrium in Competitive Markets by
Cover of the book Transforming the Patient Experience by
Cover of the book Apoptosis in Cancer Pathogenesis and Anti-cancer Therapy by
Cover of the book Asynchronous Control for Networked Systems by
Cover of the book Information Technology and Computational Physics by
Cover of the book The Physics of Semiconductor Devices by
Cover of the book Morphogenesis of the Sign by
Cover of the book Geologic Structures of the Arctic Basin by
Cover of the book Elliptic Integrals, Elliptic Functions and Modular Forms in Quantum Field Theory by
Cover of the book Learning the City by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy