Information security and cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised selected papers /
Information security and cryptology : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised selected papers /
Inscrypt 2016
Kefei Chen, Dongdai Lin, Moti Yung (eds.).
- 1 online resource (xiii, 544 pages) : illustrations
- Lecture notes in computer science, 10143 0302-9743 ; LNCS sublibrary. SL 4, Security and cryptology .
- Lecture notes in computer science ; 10143. LNCS sublibrary. SL 4, Security and cryptology. .
Includes author index.
Includes bibliographical references and author index.
Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
9783319547053 3319547054
10.1007/978-3-319-54705-3 doi
com.springer.onix.9783319547053 Springer Nature
GBB8O3115 bnb
019182501 Uk
Computer security--Congresses.
Data encryption (Computer science)--Congresses.
Sécurité informatique--Congrès.
Chiffrement (Informatique)--Congrès.
Software Engineering.
Coding theory & cryptology.
Ethical & social aspects of IT.
Network hardware.
Information retrieval.
Computer security.
Computers--Software Development & Engineering--General.
Computers--Security--General.
Computers--Social Aspects--General.
Computers--Hardware--Network Hardware.
Computers--Information Technology.
Computer security
Data encryption (Computer science)
Conference papers and proceedings
QA76.9.A25
005.8
Includes author index.
Includes bibliographical references and author index.
Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
9783319547053 3319547054
10.1007/978-3-319-54705-3 doi
com.springer.onix.9783319547053 Springer Nature
GBB8O3115 bnb
019182501 Uk
Computer security--Congresses.
Data encryption (Computer science)--Congresses.
Sécurité informatique--Congrès.
Chiffrement (Informatique)--Congrès.
Software Engineering.
Coding theory & cryptology.
Ethical & social aspects of IT.
Network hardware.
Information retrieval.
Computer security.
Computers--Software Development & Engineering--General.
Computers--Security--General.
Computers--Social Aspects--General.
Computers--Hardware--Network Hardware.
Computers--Information Technology.
Computer security
Data encryption (Computer science)
Conference papers and proceedings
QA76.9.A25
005.8