Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers / [electronic resource] :
edited by Kefei Chen, Dongdai Lin, Moti Yung.
- 1st ed. 2017.
- XIII, 544 p. 78 illus. online resource.
- Security and Cryptology, 10143 2946-1863 ; .
- Security and Cryptology, 10143 .
Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
9783319547053
10.1007/978-3-319-54705-3 doi
Data protection.
Software engineering.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Application software.
Data and Information Security.
Software Engineering.
Cryptology.
Computers and Society.
Computer Communication Networks.
Computer and Information Systems Applications.
QA76.9.A25
005.8
Symmetric ciphers -- Public-key cryptosystems -- Signature and authentication -- Homomorphic encryption.-Leakage-resilient -- Post-quantum cryptography -- Commitment and protocol -- Elliptic curves -- Security and implementation.
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Information Security and Cryptology, Inscrypt 2016, held in Beijing, China, in November 2016. The 32 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on symmetric ciphers; public-key cryptosystems; signature and authentication; homomorphic encryption; leakage-resilient; post-quantum cryptography; commitment and protocol; elliptic curves; security and implementation.
9783319547053
10.1007/978-3-319-54705-3 doi
Data protection.
Software engineering.
Cryptography.
Data encryption (Computer science).
Computers and civilization.
Computer networks .
Application software.
Data and Information Security.
Software Engineering.
Cryptology.
Computers and Society.
Computer Communication Networks.
Computer and Information Systems Applications.
QA76.9.A25
005.8