Selected Areas in Cryptography [electronic resource] : 18th International Workshop, SAC 2011, Toronto, Canada, August 11-12, 2011, Revised Selected Papers / edited by Ali Miri, Serge Vaudenay.
Contributor(s): Miri, Ali [editor.] | Vaudenay, Serge [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 7118Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XIII, 431 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642284960.Subject(s): Cryptography | Data encryption (Computer science) | Data protection | Algorithms | Computer networks | Application software | Image processing -- Digital techniques | Computer vision | Cryptology | Data and Information Security | Algorithms | Computer Communication Networks | Computer and Information Systems Applications | Computer Imaging, Vision, Pattern Recognition and GraphicsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography.
There are no comments for this item.