Cantitate/Preț
Produs

Advances in Cryptology -- ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I: Lecture Notes in Computer Science, cartea 8873

Editat de Palash Sarkar, Tetsu Iwata
en Limba Engleză Paperback – 14 noi 2014
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 39468 lei  43-57 zile
  Springer Berlin, Heidelberg – 14 noi 2014 39468 lei  43-57 zile
  Springer Berlin, Heidelberg – 14 noi 2014 39712 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 39712 lei

Nou

Puncte Express: 596

Preț estimativ în valută:
7600 7894$ 6313£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783662456101
ISBN-10: 3662456109
Pagini: 596
Ilustrații: XX, 574 p. 74 illus.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.82 kg
Ediția:2014
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Cryptology and coding theory.- Authenticated encryption.- Symmetric key cryptanalysis.- Side channel analysis.- Hyperelliptic curve cryptography.- Factoring and discrete log.- Cryptanalysis.- Signatures.- Zero knowledge.- Encryption schemes.- Outsourcing and delegation.- Obfuscation.- Homomorphic cryptography.- Secret sharing.- Block ciphers and passwords.- Black-box separation.- Composability.- Multi-party computation.