Progress in Cryptology – AFRICACRYPT 2016 [electronic resource] : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings / edited by David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi.
Material type: TextSeries: Security and Cryptology ; 9646 | Lecture Notes in Computer Science ; 9646Publisher: Cham : Springer International Publishing : Imprint: Springer, 2016Edition: 1st ed. 2016Description: X, 369 p. 49 illus. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783319315171Subject(s): Computer security | Data encryption (Computer science) | Coding theory | Information theory | Numerical analysis | Computers | Management information systems | Computer science | Systems and Data Security | Cryptology | Coding and Information Theory | Numeric Computing | Computation by Abstract Devices | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access onlineCurrent library | Home library | Call number | Materials specified | URL | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
IMSc Library | IMSc Library | Link to resource | Available | EBK15116 |
Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure protocols.-Public-key cryptography.
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016. The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography.
There are no comments on this title.