Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers

Author:   Kefei Chen ,  Dongdai Lin ,  Moti Yung
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10143
ISBN:  

9783319547046


Pages:   544
Publication Date:   03 March 2017
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers


Add your own review!

Overview

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography;  commitment and protocol; elliptic curves; security and implementation.

Full Product Details

Author:   Kefei Chen ,  Dongdai Lin ,  Moti Yung
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2017
Volume:   10143
Dimensions:   Width: 15.50cm , Height: 2.90cm , Length: 23.50cm
Weight:   8.365kg
ISBN:  

9783319547046


ISBN 10:   3319547046
Pages:   544
Publication Date:   03 March 2017
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Symmetric ciphers.- Public-key cryptosystems.- Signature and authentication.- Homomorphic encryption.-Leakage-resilient.- Post-quantum cryptography.-  Commitment and protocol.- Elliptic curves.- Security and implementation.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List