Cantitate/Preț
Produs

Progress in Cryptology -- AFRICACRYPT 2012: 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012, Proceedings: Lecture Notes in Computer Science, cartea 7374

Editat de Aikaterini Mitrokotsa, Serge Vaudenay
en Limba Engleză Paperback – 28 iun 2012
This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 32153 lei

Preț vechi: 40191 lei
-20% Nou

Puncte Express: 482

Preț estimativ în valută:
6155 6705$ 5164£

Carte tipărită la comandă

Livrare economică 18 decembrie 24 - 01 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642314094
ISBN-10: 3642314090
Pagini: 438
Ilustrații: XI, 424 p. 60 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.61 kg
Ediția:2012
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This book constitutes the refereed proceedings of the 5th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Ifrane, Morocco, in July 2012. The 24 papers presented together with abstracts of 2 invited talks were carefully reviewed and selected from 56 submissions. They are organized in topical sections on signature schemes, stream ciphers, applications of information theory, block ciphers, network security protocols, public-key cryptography, cryptanalysis of hash functions, hash functions: design and implementation, algorithms for public-key cryptography, and cryptographic protocols.

Caracteristici

Fast track conference proceedings Unique visibility State of the art research