Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers / [electronic resource] :
edited by Dongdai Lin, Shouhuai Xu, Moti Yung.
- XIII, 408 p. 51 illus. online resource.
- Lecture Notes in Computer Science, 8567 0302-9743 ; .
- Lecture Notes in Computer Science, 8567 .
Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.
9783319120874
10.1007/978-3-319-12087-4 doi
Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Algorithms.
Computer Science.
Systems and Data Security.
Data Encryption.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
QA76.9.A25
005.8
Boolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security.
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security.
9783319120874
10.1007/978-3-319-12087-4 doi
Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Algorithms.
Computer Science.
Systems and Data Security.
Data Encryption.
Coding and Information Theory.
Algorithm Analysis and Problem Complexity.
QA76.9.A25
005.8