Normal view MARC view ISBD view

Selected Areas in Cryptography - SAC 2016 [electronic resource] : 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers / edited by Roberto Avanzi, Howard Heys.

Contributor(s): Avanzi, Roberto [editor.] | Heys, Howard [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10532Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XIII, 580 p. 90 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319694535.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Microprogramming  | Computer systems | Computers, Special purpose | Numerical analysis | Cryptology | Data and Information Security | Control Structures and Microprogramming | Computer System Implementation | Special Purpose and Application-Based Systems | Numerical AnalysisAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016.  The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.
    average rating: 0.0 (0 votes)
No physical items for this record

This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016.  The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

There are no comments for this item.

Log in to your account to post a comment.