Advances in Cryptology – ASIACRYPT 2017

23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Advances in Cryptology – ASIACRYPT 2017 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319706979
Publisher: Springer International Publishing Publication: November 22, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319706979
Publisher: Springer International Publishing
Publication: November 22, 2017
Imprint: Springer
Language: English

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.

The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.

The 65 revised full papers  were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

More books from Springer International Publishing

Cover of the book North American Strategic Defense in the 21st Century: by
Cover of the book The Politics of Dependence by
Cover of the book Famines During the ʻLittle Ice Ageʼ (1300-1800) by
Cover of the book Dynamics of the Pantanal Wetland in South America by
Cover of the book Public Choice Analyses of American Economic History by
Cover of the book Is Corruption Curable? by
Cover of the book Neurologic Emergencies by
Cover of the book Exotic Nuclear Excitations: The Transverse Wobbling Mode in 135 Pr by
Cover of the book Computational and Corpus-Based Phraseology by
Cover of the book The Roles of Remote Sensing in Nature Conservation by
Cover of the book Computer and Computing Technologies in Agriculture XI by
Cover of the book Reviews of Environmental Contamination and Toxicology Volume 232 by
Cover of the book Karl Marx and the Postcolonial Age by
Cover of the book Sol-Gel Materials for Energy, Environment and Electronic Applications by
Cover of the book Human Parasites by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy