Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8873)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security
Conference proceedings info: ASIACRYPT 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (29 papers)
-
Front Matter
-
Cryptology and Coding Theory
-
Symmetric Key Cryptanalysis
-
Factoring and Discrete Log
Other Volumes
-
Advances in Cryptology – ASIACRYPT 2014
About this book
Keywords
- cryptanalysis and other attacks
- cryptography
- hardware attacks and countermeasures
- information theory
- information-theoretic techniques
- key management
- mathematical foundations of cryptography
- mathematics of computing
- public key (asymmetric) techniques
- public key encryption
- security in hardware
- security services
- software and application security
- symmetric cryptography and hash functions
Editors and Affiliations
-
Applied Statistics Unit, Indian Statistical Institute, Kolkata, India
Palash Sarkar
-
Nagoya University, Japan
Tetsu Iwata
Bibliographic Information
Book Title: Advances in Cryptology -- ASIACRYPT 2014
Book Subtitle: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I
Editors: Palash Sarkar, Tetsu Iwata
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-45611-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2014
Softcover ISBN: 978-3-662-45610-1Published: 14 November 2014
eBook ISBN: 978-3-662-45611-8Published: 07 November 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XX, 574
Number of Illustrations: 74 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Management of Computing and Information Systems, Theory of Computation, Mathematics of Computing