Normal view MARC view ISBD view

Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology [electronic resource] : Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers / edited by Raphaël C.-W. Phan, Moti Yung.

Contributor(s): Phan, Raphaël C.-W [editor.] | Yung, Moti [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 10311Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017.Description: XI, 573 p. 84 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783319612737.Subject(s): Cryptography | Data encryption (Computer science) | Computer science -- Mathematics | Discrete mathematics | Electronic data processing -- Management | Computer networks  | Algorithms | Cryptology | Discrete Mathematics in Computer Science | IT Operations | Computer Communication Networks | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence.
In: Springer Nature eBookSummary: This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .
    average rating: 0.0 (0 votes)
No physical items for this record

Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence.

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .

There are no comments for this item.

Log in to your account to post a comment.