Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers

Author:   Dongdai Lin ,  Shouhuai Xu ,  Moti Yung
Publisher:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8567
ISBN:  

9783319120867


Pages:   408
Publication Date:   30 October 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Information Security and Cryptology: 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers


Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.

Full Product Details

Author:   Dongdai Lin ,  Shouhuai Xu ,  Moti Yung
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   2014 ed.
Volume:   8567
Dimensions:   Width: 15.50cm , Height: 2.20cm , Length: 23.50cm
Weight:   0.646kg
ISBN:  

9783319120867


ISBN 10:   3319120867
Pages:   408
Publication Date:   30 October 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Boolean Function and Block Cipher.- Sequence and Stream Cipher.- Applications: Systems and Theory.- Computational Number Theory.- Public Key Cryptography.- Hash Function.- Side-Channel and Leakage.- Application and System Security.

Reviews

Author Information

Tab Content 6

Author Website:  

Countries Available

All regions
Latest Reading Guide

NOV RG 20252

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List