Selected Areas in Cryptography - SAC 2015

22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Selected Areas in Cryptography - SAC 2015 by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319313016
Publisher: Springer International Publishing Publication: March 17, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319313016
Publisher: Springer International Publishing
Publication: March 17, 2016
Imprint: Springer
Language: English

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. 

The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. 

The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.

More books from Springer International Publishing

Cover of the book Hip Hop, Hegel, and the Art of Emancipation by
Cover of the book Smart Information Systems by
Cover of the book Spintronics-based Computing by
Cover of the book Challenges to Democratic Governance in Developing Countries by
Cover of the book General Equilibrium Foundation of Partial Equilibrium Analysis by
Cover of the book New Directions in Third Wave Human-Computer Interaction: Volume 1 - Technologies by
Cover of the book The International Dimensions of Democratization in Egypt by
Cover of the book Pharmacotherapy in Aortic Disease by
Cover of the book September 11, 2001 as a Cultural Trauma by
Cover of the book Schooling and Travelling Communities by
Cover of the book Autoimmune Bullous Diseases by
Cover of the book Euclidean Distance Geometry by
Cover of the book Computer-Supported Collaborative Decision-Making by
Cover of the book Service-Oriented Computing – ICSOC 2016 Workshops by
Cover of the book Complaint Management and Channel Choice by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy