Topics in Cryptology – CT-RSA 2011 [electronic resource] : The Cryptographers’ Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings / edited by Aggelos Kiayias.
Material type: TextSeries: Lecture Notes in Computer Science ; 6558Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XIII, 417p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783642190742Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Computational complexity | Computer Science | Data Encryption | Discrete Mathematics in Computer Science | Systems and Data Security | Computer Communication Networks | Algorithm Analysis and Problem ComplexityAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.Current library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK9513 |
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2011, CT-RSA 2011, held in San Francisco, CA, USA, in February 2011. The 24 revised full papers presented together with 1 invited lecture were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on secure two-party computation, cryptographic primitives, side channel attacks, authenticated key agreement, proofs of security, block ciphers, security notions, public-key encryption, crypto tools and parameters, and digital signatures.
There are no comments on this title.