Normal view MARC view ISBD view

Topics in Cryptology - CT-RSA 2012 [electronic resource] : The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012, Proceedings / edited by Orr Dunkelman.

Contributor(s): Dunkelman, Orr [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 7178Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XI, 434 p. 85 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642279546.Subject(s): Cryptography | Data encryption (Computer science) | Computer science -- Mathematics | Discrete mathematics | Data protection | Computer networks  | Algorithms | Cryptology | Discrete Mathematics in Computer Science | Data and Information Security | Computer Communication Networks | AlgorithmsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.
    average rating: 0.0 (0 votes)
No physical items for this record

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2012, CT-RSA 2012, held in San Francisco, CA, USA, in February/March 2012. The 26 revised full papers presented were carefully reviewed and selected from 113 submissions. The papers are organized in topical sections on side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and secure multiparty computation.

There are no comments for this item.

Log in to your account to post a comment.