Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10625)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (23 papers)
-
Asiacrypt 2017 Award Paper I
-
Quantum Algorithms
-
Block Chains
Other volumes
-
Advances in Cryptology – ASIACRYPT 2017
-
Advances in Cryptology – ASIACRYPT 2017
-
Advances in Cryptology – ASIACRYPT 2017
Keywords
About this book
The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology – ASIACRYPT 2017
Book Subtitle: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
Editors: Tsuyoshi Takagi, Thomas Peyrin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-70697-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2017
Softcover ISBN: 978-3-319-70696-2Published: 18 November 2017
eBook ISBN: 978-3-319-70697-9Published: 22 November 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIX, 701
Number of Illustrations: 98 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Management of Computing and Information Systems, Theory of Computation, Mathematics of Computing