Progress in Cryptology – INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings

Author:   Debrup Chakraborty ,  Tetsu Iwata
Publisher:   Springer Nature Switzerland AG
Edition:   1st ed. 2018
Volume:   11356
ISBN:  

9783030053772


Pages:   399
Publication Date:   05 December 2018
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Progress in Cryptology – INDOCRYPT 2018: 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.

Full Product Details

Author:   Debrup Chakraborty ,  Tetsu Iwata
Publisher:   Springer Nature Switzerland AG
Imprint:   Springer Nature Switzerland AG
Edition:   1st ed. 2018
Volume:   11356
Weight:   0.646kg
ISBN:  

9783030053772


ISBN 10:   3030053776
Pages:   399
Publication Date:   05 December 2018
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Outsourced Computation and Searchable Encryption.- Symmetric Key Cryptography and Format Preserving Encryption.- Fault Attacks and Hash Functions.- Post Quantum Cryptography.- Asymmetric Key Cryptography and Cryptanalysis.- Symmetric Key Cryptanalysis.- Theory.- Secure Computations and Protocols.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List