Vi bøger
Levering: 1 - 2 hverdage
Forlænget returret til d. 31. januar 2025

Advances in Cryptology -- ASIACRYPT 2013 - Palash Sarkar - Bog

Bag om Advances in Cryptology -- ASIACRYPT 2013

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Vis mere
  • Sprog:
  • Engelsk
  • ISBN:
  • 9783642420443
  • Indbinding:
  • Paperback
  • Sideantal:
  • 568
  • Udgivet:
  • 31. oktober 2013
  • Størrelse:
  • 155x31x235 mm.
  • Vægt:
  • 850 g.
  • 8-11 hverdage.
  • 15. januar 2025
På lager
Forlænget returret til d. 31. januar 2025
  •  

    Kan ikke leveres inden jul.
    Køb nu og print et gavebevis

Normalpris

Medlemspris

Prøv i 30 dage for 45 kr.
Herefter fra 79 kr./md. Ingen binding.

Beskrivelse af Advances in Cryptology -- ASIACRYPT 2013

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.

Brugerbedømmelser af Advances in Cryptology -- ASIACRYPT 2013



Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.