Topics in Cryptology - CT-RSA 2016

The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Topics in Cryptology - CT-RSA 2016 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319294858
Publisher: Springer International Publishing Publication: February 2, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319294858
Publisher: Springer International Publishing
Publication: February 2, 2016
Imprint: Springer
Language: English

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016.

The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016.

The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.

More books from Springer International Publishing

Cover of the book Mechanisms of Molecular Carcinogenesis – Volume 2 by
Cover of the book Michał Kalecki: An Intellectual Biography by
Cover of the book Ecology of Marine Ports of the Black and Azov Sea Basin by
Cover of the book The Euroschool on Exotic Beams - Vol. 5 by
Cover of the book Motion Control of Underactuated Mechanical Systems by
Cover of the book QoE Management in Wireless Networks by
Cover of the book Modeling of Gas-to-Particle Mass Transfer in Turbulent Flows by
Cover of the book Reviews of Physiology, Biochemistry and Pharmacology 166 by
Cover of the book Validating Neuro-Computational Models of Neurological and Psychiatric Disorders by
Cover of the book Low-Carbon Energy in Africa and Latin America by
Cover of the book Medical Image Computing and Computer Assisted Intervention – MICCAI 2018 by
Cover of the book Model-Free Prediction and Regression by
Cover of the book Renewable Energy for Unleashing Sustainable Development by
Cover of the book Memory Frictions in Contemporary Literature by
Cover of the book Prediction of Polymeric Membrane Separation and Purification Performances by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy