Skip to main content
Book cover

Advances in Cryptology -- ASIACRYPT 2014

20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Proceedings, Part I

  • Conference proceedings
  • © 2014

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8873)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ASIACRYPT 2014.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (29 papers)

  1. Cryptology and Coding Theory

  2. New Proposals

  3. Authenticated Encryption

  4. Symmetric Key Cryptanalysis

  5. Side Channel Analysis I

  6. Hyperelliptic Curve Cryptography

  7. Factoring and Discrete Log

Other volumes

  1. Advances in Cryptology – ASIACRYPT 2014

  2. Advances in Cryptology – ASIACRYPT 2014

Keywords

About this book

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation.

Editors and Affiliations

  • Applied Statistics Unit, Indian Statistical Institute, Kolkata, India

    Palash Sarkar

  • Nagoya University, Japan

    Tetsu Iwata

Bibliographic Information

Publish with us