Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8874)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
Table of contents (27 papers)
-
Outsourcing and Delegation
-
Obfuscation
-
Block Ciphers and Passwords
Other volumes
-
Advances in Cryptology – ASIACRYPT 2014
-
Advances in Cryptology – ASIACRYPT 2014
Keywords
- cryptanalysis and other attacks
- cryptography
- hardware attacks and countermeasures
- information theory
- information-theoretic techniques
- key management
- mathematical foundations of cryptography
- mathematics of computing
- public key (asymmetric) techniques
- public key encryption
- security in hardware
- security services
- software and application security
- symmetric cryptography and hash functions
About this book
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology -- ASIACRYPT 2014
Book Subtitle: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
Editors: Palash Sarkar, Tetsu Iwata
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-45608-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2014
Softcover ISBN: 978-3-662-45607-1Published: 14 November 2014
eBook ISBN: 978-3-662-45608-8Published: 06 November 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXII, 528
Number of Illustrations: 76 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Management of Computing and Information Systems, Theory of Computation, Mathematics of Computing