Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I: Lecture Notes in Computer Science, cartea 10624

Editat de Tsuyoshi Takagi, Thomas Peyrin
en Limba Engleză Paperback – 30 noi 2017
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 39929 lei  6-8 săpt.
  Springer International Publishing – 17 noi 2017 39929 lei  6-8 săpt.
  Springer International Publishing – 18 noi 2017 41278 lei  6-8 săpt.
  Springer International Publishing – 30 noi 2017 72332 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 72332 lei

Preț vechi: 85097 lei
-15% Nou

Puncte Express: 1085

Preț estimativ în valută:
13845 14546$ 11635£

Carte tipărită la comandă

Livrare economică 12-26 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319706931
ISBN-10: 3319706934
Pagini: 792
Ilustrații: XXVI, 813 p. 121 illus.
Dimensiuni: 155 x 235 mm
Greutate: 1.15 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Post-Quantum Cryptography.- Symmetric Key Cryptanalysis.- Lattices.- Homomorphic Encryptions.-Access Control.- Oblivious Protocols.- Side Channel Analysis. 

Caracteristici

Includes supplementary material: sn.pub/extras