Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9496)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: IMACC 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (19 papers)
-
Invited Paper
-
Best Paper Award
-
Authentication
Keywords
- Authentication
- Cryptography
- Information theory
- Provable security
- Security
- Anonymous credentials
- Bent functions
- Boolean functions
- Coding theory
- Cryptanalysis
- Digital signatures
- Encryption
- Entropy
- Error correction
- Higher order differentiation
- Lattices
- Leakage resilience
- Multi-party computation
- Side-channel attacks
- Zero-knowledge proofs
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Cryptography and Coding
Book Subtitle: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
Editors: Jens Groth
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-27239-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-27238-2Published: 20 November 2015
eBook ISBN: 978-3-319-27239-9Published: 07 December 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 329
Number of Illustrations: 42 illustrations in colour
Topics: Cryptology, Coding and Information Theory, Algorithm Analysis and Problem Complexity, Systems and Data Security, Discrete Mathematics in Computer Science