Topics in Cryptology - CT-RSA 2016

The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Topics in Cryptology - CT-RSA 2016 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319294858
Publisher: Springer International Publishing Publication: February 2, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319294858
Publisher: Springer International Publishing
Publication: February 2, 2016
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016.

The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016.

The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

More books from Springer International Publishing

Cover of the book Reconciling Law and Morality in Human Rights Discourse by
Cover of the book Game Theory for Security and Risk Management by
Cover of the book Damage Control in Trauma Care by
Cover of the book Advances in Human Factors in Architecture, Sustainable Urban Planning and Infrastructure by
Cover of the book Innovations for Community Services by
Cover of the book Contemporary Irish Poetry and the Canon by
Cover of the book Practitioner's Guide to Ethics and Mindfulness-Based Interventions by
Cover of the book Public Health Intelligence and the Internet by
Cover of the book Socio-technical Design of Ubiquitous Computing Systems by
Cover of the book Kant in Imperial Russia by
Cover of the book Current Approach to Heart Failure by
Cover of the book Anatomic Study of the Clitoris and the Bulbo-Clitoral Organ by
Cover of the book Recent Contributions in Intelligent Systems by
Cover of the book Micro and Nano Machining of Engineering Materials by
Cover of the book Feminist Periodicals and Daily Life by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy