Coverart for item
The Resource Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I, Palash Sarkar, Tetsu Iwata (Eds.)

Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I, Palash Sarkar, Tetsu Iwata (Eds.)

Label
Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I
Title
Advances in cryptology-- ASIACRYPT 2014
Title remainder
20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings
Title number
Part I
Statement of responsibility
Palash Sarkar, Tetsu Iwata (Eds.)
Title variation
ASIACRYPT 2014
Creator
Contributor
Editor
Subject
Genre
Language
eng
Summary
The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation
Member of
Is part of
Cataloging source
NLGGC
Dewey number
005.8/2
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2014
http://bibfra.me/vocab/lite/meetingName
International Conference on the Theory and Application of Cryptology and Information Security
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorDate
1969-
http://library.link/vocab/relatedWorkOrContributorName
  • Sarkar, Palash
  • Iwata, Tetsu
Series statement
  • Lecture Notes in Computer Science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
8873
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Computer security
  • Computer security
  • Data encryption (Computer science)
Label
Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I, Palash Sarkar, Tetsu Iwata (Eds.)
Instantiates
Publication
Copyright
Note
  • International conference proceedings
  • Includes author index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation
Control code
897802667
Extent
1 online resource (xix, 574 pages)
Form of item
online
Isbn
9783662456118
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)897802667
Label
Advances in cryptology-- ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, December 7-11, 2014, Proceedings, Part I, Palash Sarkar, Tetsu Iwata (Eds.)
Publication
Copyright
Note
  • International conference proceedings
  • Includes author index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation
Control code
897802667
Extent
1 online resource (xix, 574 pages)
Form of item
online
Isbn
9783662456118
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)897802667

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...