Normal view MARC view ISBD view

Progress in Cryptology – AFRICACRYPT 2011 [electronic resource] : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011. Proceedings / edited by Abderrahmane Nitaj, David Pointcheval.

By: Nitaj, Abderrahmane [editor.].
Contributor(s): Pointcheval, David [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 6737Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2011Description: XIII, 387p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642219696.Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data protection | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Data Encryption | Computer Communication Networks | Management of Computing and Information Systems | Algorithm Analysis and Problem Complexity | Systems and Data Security | Operating SystemsDDC classification: 005.82 Online resources: Click here to access online In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

This book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue