Overview
- High quality selected papers
- Unique visibility
- State of the art research
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6584)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: Inscrypt 2010.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (35 papers)
-
Stream Ciphers, Sequences and Elliptic Curves
-
Hash Functions
-
Key Management
Keywords
About this book
The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
Editors: Xuejia Lai, Moti Yung, Dongdai Lin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-21518-6
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Berlin Heidelberg 2011
Softcover ISBN: 978-3-642-21517-9Published: 08 July 2011
eBook ISBN: 978-3-642-21518-6Published: 08 July 2011
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 524
Number of Illustrations: 60 b/w illustrations, 31 illustrations in colour
Topics: Computer Communication Networks, Cryptology, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Systems and Data Security, Computers and Society