Normal view MARC view ISBD view

Selected Areas in Cryptography [electronic resource] : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers / edited by Ali Miri, Serge Vaudenay.

By: Miri, Ali [editor.].
Contributor(s): Vaudenay, Serge [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 7118Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012Description: XIII, 431 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642284960.Subject(s): Computer science | Computer Communication Networks | Data protection | Data encryption (Computer science) | Computer software | Computer vision | Computer Science | Data Encryption | Systems and Data Security | Algorithm Analysis and Problem Complexity | Computer Communication Networks | Information Systems Applications (incl. Internet) | Computer Imaging, Vision, Pattern Recognition and GraphicsDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue