Topics in Cryptology -- CT-RSA 2011 [electronic resource] : The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011, Proceedings / edited by Aggelos Kiayias.
Contributor(s): Kiayias, Aggelos [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 6558Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XIII, 417 p. 70 illus., 20 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642190742.Subject(s): Cryptography | Data encryption (Computer science) | Computer science -- Mathematics | Discrete mathematics | Data protection | Computer networks | Algorithms | Cryptology | Discrete Mathematics in Computer Science | Data and Information Security | Computer Communication Networks | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.No physical items for this record
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
There are no comments for this item.