Advances in Cryptology - ASIACRYPT 2013 : 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II /

The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 2...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Sarkar, Palash (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg Imprint: Springer, 2013.
Series:Lecture Notes in Computer Science, 8270
Subjects:
Online Access:Click here to view the full text content
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02900nam a2200457 i 4500
001 vtls000115809
003 MY-ArUMP
005 20210731152537.0
006 m fq d
007 cr nn 008mamaa
008 140609s2013 gw | s |||| 0|eng d
020 |a 9783642420450 
039 9 |a 201410121017  |b NY  |c 201406091328  |d NY  |c 201405281042  |d NY  |y 201405202156  |z NY 
040 |a MYPMP  |b eng  |c MYPMP  |e rda 
245 1 0 |a Advances in Cryptology - ASIACRYPT 2013 :  |b 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II /  |c edited by Kazue Sako, Palash Sarkar. 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |b Imprint: Springer,  |c 2013. 
300 |a 1 online resource ( XXIV, 542 pages)  |b 58 illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8270 
505 0 |a Message Authentication Codes -- Signatures -- Cryptography Based Upon Physical Assumptions -- Multi-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage-Resilient Cryptography -- Two-Party Computation -- Hash Functions. 
520 |a The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions. 
650 0 |a Computer science. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer software. 
650 0 |a Computational complexity. 
650 0 |a Information Systems. 
650 0 |a Mathematics. 
700 1 |a Sarkar, Palash.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642420443 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8270 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-42045-0  |y Click here to view the full text content 
942 |2 lcc  |c BK-EBOOK 
949 |a VIRTUAITEM  |d 10011  |x 9 
999 |c 55082  |d 55082 
952 |0 0  |1 0  |2 lcc  |4 0  |7 0  |9 50327  |a FSGM  |b FSGM  |d 2021-07-31  |l 0  |r 2021-07-31  |w 2021-07-31  |y BK-EBOOK