Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II: Lecture Notes in Computer Science, cartea 10032

Editat de Jung Hee Cheon, Tsuyoshi Takagi
en Limba Engleză Paperback – 9 noi 2016
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (2) 67308 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 9 noi 2016 67308 lei  6-8 săpt.
  Springer Berlin, Heidelberg – 9 noi 2016 67868 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 67868 lei

Preț vechi: 79844 lei
-15% Nou

Puncte Express: 1018

Preț estimativ în valută:
12991 13648$ 10917£

Carte tipărită la comandă

Livrare economică 12-26 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783662538890
ISBN-10: 366253889X
Pagini: 1028
Ilustrații: XXIV, 1055 p. 198 illus.
Dimensiuni: 155 x 235 x 54 mm
Greutate: 1.48 kg
Ediția:1st ed. 2016
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Cuprins

Mathematical Analysis.- AES and White-Box.- Hash Function; Randomness.- Authenticated Encryption.- Block Cipher.- SCA and Leakage Resilience.- Zero Knowledge.- Post Quantum Cryptography.- Provable Security.- Digital Signature.- Functional and Homomorphic Cryptography.- ABE and IBE.- Foundation.- Cryptographic Protocol.- Multi-Party Computation.

Caracteristici

Includes supplementary material: sn.pub/extras