Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I: Lecture Notes in Computer Science, cartea 10031

Editat de Jung Hee Cheon, Tsuyoshi Takagi
en Limba Engleză Paperback – 9 noi 2016
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 65947 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 9 noi 2016 65947 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 9 noi 2016 66494 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 65947 lei

Preț vechi: 77586 lei
-15% Nou

Puncte Express: 989

Preț estimativ în valută:
12625 13123$ 10467£

Carte tipărită la comandă

Livrare economică 06-20 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783662538869
ISBN-10: 3662538865
Pagini: 969
Ilustrații: XXIV, 941 p. 217 illus.
Dimensiuni: 155 x 235 x 49 mm
Greutate: 1.32 kg
Ediția:1st ed. 2016
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Cuprins

Mathematical Analysis.- AES and White-Box.- Hash Function; Randomness.- Authenticated Encryption.- Block Cipher.- SCA and Leakage Resilience.- Zero Knowledge.- Post Quantum Cryptography.- Provable Security.- Digital Signature.- Functional and Homomorphic Cryptography.- ABE and IBE.- Foundation.- Cryptographic Protocol.- Multi-Party Computation.

Caracteristici

Includes supplementary material: sn.pub/extras