
Advances in Cryptology - ASIACRYPT 2016 : 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I
Free delivery worldwide
Available. Expected delivery to the United States in 9-14 business days.
Not ordering to the United States? Click here.
Description
The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.
The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
show more
The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
show more
Product details
- Paperback | 941 pages
- 155 x 235 x 48.51mm | 1,324.49g
- 09 Nov 2016
- Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
- Springer-Verlag Berlin and Heidelberg GmbH & Co. K
- Berlin, Germany
- English
- 1st ed. 2016
- 217 Illustrations, black and white; XXIV, 941 p. 217 illus.
- 3662538865
- 9783662538869
Table of contents
Mathematical Analysis.- AES and White-Box.- Hash Function; Randomness.- Authenticated Encryption.- Block Cipher.- SCA and Leakage Resilience.- Zero Knowledge.- Post Quantum Cryptography.- Provable Security.- Digital Signature.- Functional and Homomorphic Cryptography.- ABE and IBE.- Foundation.- Cryptographic Protocol.- Multi-Party Computation.
show more
show more