Cantitate/Preț
Produs

Advances in Cryptology – ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III: Lecture Notes in Computer Science, cartea 10626

Editat de Tsuyoshi Takagi, Thomas Peyrin
en Limba Engleză Paperback – 17 noi 2017
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Citește tot Restrânge

Toate formatele și edițiile

Toate formatele și edițiile Preț Express
Paperback (3) 39929 lei  43-57 zile
  Springer International Publishing – 17 noi 2017 39929 lei  43-57 zile
  Springer International Publishing – 18 noi 2017 41278 lei  43-57 zile
  Springer International Publishing – 30 noi 2017 72332 lei  43-57 zile

Din seria Lecture Notes in Computer Science

Preț: 39929 lei

Nou

Puncte Express: 599

Preț estimativ în valută:
7641 7997$ 6359£

Carte tipărită la comandă

Livrare economică 31 martie-14 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783319706993
ISBN-10: 3319706993
Pagini: 460
Ilustrații: XVIII, 473 p. 69 illus., 10 illus. in color.
Dimensiuni: 155 x 235 mm
Greutate: 0.68 kg
Ediția:1st ed. 2017
Editura: Springer International Publishing
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Cham, Switzerland

Cuprins

Cryptographic Protocols.- Foundations.- Zero-Knowledge Proofs.- Symmetric Key Designs.

Caracteristici

Includes supplementary material: sn.pub/extras