Information Security and Cryptology [electronic resource] : 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / edited by Kefei Chen, Dongdai Lin, Moti Yung.
Material type: TextSeries: Security and Cryptology ; 10143 | Lecture Notes in Computer Science ; 10143Publisher: Cham : Springer International Publishing : Imprint: Springer, 2017Edition: 1st ed. 2017Description: XIII, 544 p. 78 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319547053Subject(s): Computer security | Software engineering | Data encryption (Computer science) | Computers and civilization | Computer communication systems | Application software | Systems and Data Security | Software Engineering | Cryptology | Computers and Society | Computer Communication Networks | Information Systems Applications (incl. Internet)Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK15638 |
Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
There are no comments on this title.