語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Advances in cryptology - ASIACRYPT 2...
~
Cheon, Jung Hee.
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
杜威分類號:
005.82
書名/作者:
Advances in cryptology - ASIACRYPT 2015 : 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings./ edited by Tetsu Iwata, Jung Hee Cheon.
其他題名:
ASIACRYPT 2015
其他作者:
Iwata, Tetsu.
團體作者:
Clark Conference
出版者:
Berlin, Heidelberg : : Springer Berlin Heidelberg :, 2015.
面頁冊數:
xxv, 810 p. : : ill., digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Data encryption (Computer science)
標題:
Computer science.
標題:
Computer security.
標題:
Coding theory.
標題:
Computers.
標題:
Computer science - Mathematics.
標題:
Management information systems.
標題:
Data Encryption.
標題:
Systems and Data Security.
標題:
Coding and Information Theory.
標題:
Management of Computing and Information Systems.
標題:
Theory of Computation.
標題:
Mathematics of Computing.
ISBN:
9783662487976
ISBN:
9783662487969
摘要、提要註:
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.
電子資源:
http://dx.doi.org/10.1007/978-3-662-48797-6
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
Advances in cryptology - ASIACRYPT 2015
21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /[electronic resource] :ASIACRYPT 2015edited by Tetsu Iwata, Jung Hee Cheon. - Berlin, Heidelberg :Springer Berlin Heidelberg :2015. - xxv, 810 p. :ill., digital ;24 cm. - Lecture notes in computer science,94520302-9743 ;. - Lecture notes in computer science ;7103..
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.
ISBN: 9783662487976
Standard No.: 10.1007/978-3-662-48797-6doiSubjects--Topical Terms:
369827
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Advances in cryptology - ASIACRYPT 2015[electronic resource] :21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.Part I /
LDR
:02011nam a2200325 a 4500
001
444077
003
DE-He213
005
20160429112715.0
006
m d
007
cr nn 008maaau
008
160715s2015 gw s 0 eng d
020
$a
9783662487976
$q
(electronic bk.)
020
$a
9783662487969
$q
(paper)
024
7
$a
10.1007/978-3-662-48797-6
$2
doi
035
$a
978-3-662-48797-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
I61 2015
111
2
$a
Clark Conference
$d
(2005 :
$c
Sterling and Francine Clark Art Institute)
$3
347558
245
1 0
$a
Advances in cryptology - ASIACRYPT 2015
$h
[electronic resource] :
$b
21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015 : proceedings.
$n
Part I /
$c
edited by Tetsu Iwata, Jung Hee Cheon.
246
3
$a
ASIACRYPT 2015
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2015.
300
$a
xxv, 810 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9452
520
$a
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.
650
0
$a
Data encryption (Computer science)
$3
369827
650
0
$a
Computer science.
$3
182962
650
0
$a
Computer security.
$3
338952
650
0
$a
Coding theory.
$3
188068
650
0
$a
Computers.
$3
182571
650
0
$a
Computer science
$x
Mathematics.
$3
382369
650
0
$a
Management information systems.
$3
336744
650
2 4
$a
Data Encryption.
$3
465773
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Coding and Information Theory.
$3
465532
650
2 4
$a
Management of Computing and Information Systems.
$3
466225
650
2 4
$a
Theory of Computation.
$3
464054
650
2 4
$a
Mathematics of Computing.
$3
465323
700
1
$a
Iwata, Tetsu.
$3
635244
700
1
$a
Cheon, Jung Hee.
$3
635245
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
7103.
$3
466200
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-48797-6
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-3-662-48797-6
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入