Information Security and Cryptology 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers / [electronic resource] :
edited by Zhe Liu, Moti Yung.
- 1st ed. 2020.
- XIV, 562 p. 264 illus., 71 illus. in color. online resource.
- Security and Cryptology, 12020 2946-1863 ; .
- Security and Cryptology, 12020 .
Invited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel Attacks -- Identity-Based Cryptography -- Signatures -- Cryptanalysis -- Authentication -- Mathematical Foundations.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
9783030429218
10.1007/978-3-030-42921-8 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Application software.
Computer networks .
Computer networks--Security measures.
Computer systems.
Data and Information Security.
Cryptology.
Computer and Information Systems Applications.
Computer Communication Networks.
Mobile and Network Security.
Computer System Implementation.
QA76.9.A25
005.8
Invited Papers -- Post-Quantum Cryptography -- AI Security -- Systems Security -- Side Channel Attacks -- Identity-Based Cryptography -- Signatures -- Cryptanalysis -- Authentication -- Mathematical Foundations.
This book constitutes the post-conference proceedings of the 15th International Conference on Information Security and Cryptology, Inscrypt 2019, held in Nanjing, China, in December 2019. The 23 full papers presented together with 8 short papers and 2 invited papers were carefully reviewed and selected from 94 submissions. The papers cover topics in the fields of post-quantum cryptology; AI security; systems security; side channel attacks; identity-based cryptography; signatures; cryptanalysis; authentication; and mathematical foundations.
9783030429218
10.1007/978-3-030-42921-8 doi
Data protection.
Cryptography.
Data encryption (Computer science).
Application software.
Computer networks .
Computer networks--Security measures.
Computer systems.
Data and Information Security.
Cryptology.
Computer and Information Systems Applications.
Computer Communication Networks.
Mobile and Network Security.
Computer System Implementation.
QA76.9.A25
005.8