Selected Areas in Cryptography -- SAC 2014

21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Selected Areas in Cryptography -- SAC 2014 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319130514
Publisher: Springer International Publishing Publication: December 4, 2014
Imprint: Springer Language: English
Author:
ISBN: 9783319130514
Publisher: Springer International Publishing
Publication: December 4, 2014
Imprint: Springer
Language: English

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.
The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

More books from Springer International Publishing

Cover of the book Genetic Data Analysis for Plant and Animal Breeding by
Cover of the book Advances in Geocomputation by
Cover of the book Introduction to HPC with MPI for Data Science by
Cover of the book Modeling Binary Correlated Responses using SAS, SPSS and R by
Cover of the book International Scientific Conference Energy Management of Municipal Facilities and Sustainable Energy Technologies EMMFT 2018 by
Cover of the book Berichte zu Pflanzenschutzmitteln by
Cover of the book The Advent of Unmanned Electric Vehicles by
Cover of the book Emergent Nested Systems by
Cover of the book Wind Field and Solar Radiation Characterization and Forecasting by
Cover of the book Water, Energy, Food and People Across the Global South by
Cover of the book Cyberphysical Systems for Epilepsy and Related Brain Disorders by
Cover of the book Modern Functional Evaluation Methods for Muscle Strength and Gait Analysis by
Cover of the book Touchless Palmprint Recognition Systems by
Cover of the book Image and Video Technology – PSIVT 2015 Workshops by
Cover of the book Health Disparities in Respiratory Medicine by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy