Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I: Lecture Notes in Computer Science, cartea 10624

Editat de Tsuyoshi Takagi, Thomas Peyrin
en Limba Engleză Paperback – 30 noi 2017
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 39127 lei  6-8 săpt.
  Springer International Publishing – 17 noi 2017 39127 lei  6-8 săpt.
  Springer International Publishing – 18 noi 2017 40448 lei  6-8 săpt.
  Springer International Publishing – 30 noi 2017 70869 lei  6-8 săpt.

Din seria Lecture Notes in Computer Science

Preț: 70869 lei

Preț vechi: 83375 lei
-15% Nou

Puncte Express: 1063

Preț estimativ în valută:
13567 14102$ 11249£

Carte tipărită la comandă

Livrare economică 05-19 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319706931
ISBN-10: 3319706934
Pagini: 792
Ilustrații: XXVI, 813 p. 121 illus.
Dimensiuni: 155 x 235 mm
Greutate: 1.15 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Post-Quantum Cryptography.- Symmetric Key Cryptanalysis.- Lattices.- Homomorphic Encryptions.-Access Control.- Oblivious Protocols.- Side Channel Analysis. 

Caracteristici

Includes supplementary material: sn.pub/extras