Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology -

Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology

Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers
Buch | Softcover
XI, 573 Seiten
2017 | 1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-61272-0 (ISBN)
CHF 74,85 inkl. MwSt
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected  from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.

 

Revisiting tradition.- Different paradigms.- Cryptofication.- Malicious cryptography.- Advances in cryptanalysis.- Primitives and features; cryptanalysis correspondence.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XI, 573 p. 84 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 890 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • Algorithms & Data Structures • Algorithms & data structures • anonymity • Applications • authentication • Computer Communication Networks • Computer Science • conference proceedings • Cryptanalysis • cryptographic protocols • cryptography • cypher implementation • data encryption • delegation of authorities • DES • Discrete Mathematics • Discrete mathematics in computer science • Informatics • information architecture • Intrusion Detection • Maintenance & repairs • Maintenance & repairs • management of computing and information systems • Maths for computer scientists • network hardware • privacy • Research • Rijndael attacks • rsa • Security Engineering • signature schemes • Systems Security • trust requirements
ISBN-10 3-319-61272-7 / 3319612727
ISBN-13 978-3-319-61272-0 / 9783319612720
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich