Advances in Cryptology – ASIACRYPT 2017

23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – ASIACRYPT 2017 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319706948
Publisher: Springer International Publishing Publication: November 29, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319706948
Publisher: Springer International Publishing
Publication: November 29, 2017
Imprint: Springer
Language: English

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.

The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.

The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

More books from Springer International Publishing

Cover of the book The Formation and Disruption of Black Hole Jets by
Cover of the book Climate, Fire and Human Evolution by
Cover of the book Numerical Simulations of Coupled Problems in Engineering by
Cover of the book Bridging the Gap between Life and Physics by
Cover of the book Neo-Thinking on Ganges-Brahmaputra Basin Geomorphology by
Cover of the book Biomass and Green Chemistry by
Cover of the book Resisting Education: A Cross-National Study on Systems and School Effects by
Cover of the book American Jewish Year Book 2017 by
Cover of the book The Matrix of Insanity in Modern Criminal Law by
Cover of the book Towards Autonomous Robotic Systems by
Cover of the book Serious Games Analytics by
Cover of the book Stochastic and Infinite Dimensional Analysis by
Cover of the book Big Data Analytics in the Social and Ubiquitous Context by
Cover of the book Local Government Budget Stabilization by
Cover of the book The US-China Military and Defense Relationship during the Obama Presidency by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy