Advances In Cryptology - Asiacrypt 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, by Palash SarkarAdvances In Cryptology - Asiacrypt 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, by Palash Sarkar

Advances In Cryptology - Asiacrypt 2014: 20th International Conference on the Theory and…

byPalash SarkarEditorTetsu Iwata

Paperback | November 14, 2014

Pricing and Purchase Info

$115.43 online 
$137.95 list price save 16%
Earn 577 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.
Title:Advances In Cryptology - Asiacrypt 2014: 20th International Conference on the Theory and…Format:PaperbackDimensions:528 pages, 23.5 × 15.5 × 0.02 inPublished:November 14, 2014Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3662456079

ISBN - 13:9783662456071

Reviews

Table of Contents

Cryptology and coding theory.- Authenticated encryption.- Symmetric key cryptanalysis.- Side channel analysis.- Hyperelliptic curve cryptography.- Factoring and discrete log.- Cryptanalysis.- Signatures.- Zero knowledge.- Encryption schemes.- Outsourcing and delegation.- Obfuscation.- Homomorphic cryptography.- Secret sharing.- Block ciphers and passwords.- Black-box separation.- Composability.- Multi-party computation.