Topics in Cryptology -- CT-RSA 2015 [Elektronische Daten] : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings / edited by Kaisa Nyberg.

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on foll...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Other Authors: Nyberg, Kaisa
Format: eBook
Language:English
Published: Cham : Springer International Publishing, 2015.
Series:Lecture Notes in Computer Science ; 9048.
Subjects:

MARC

LEADER 00000cam a2200000u 4500
001 b8042974
003 CoU
005 20150617074133.8
006 m o d
007 cr |||||||||||
008 150310s2015 gw o 000 0 eng d
020 |z 9783319167145 (print) 
020 |z 3319167146 (print) 
020 |a 9783319167152 (eISBN) 
020 |a 3319167154 (eISBN) 
024 7 |a 10.1007/978-3-319-16715-2 
035 |a (OCoLC)spr907012713 
035 |a (OCoLC)907012713 
037 |a spr10.1007/978-3-319-16715-2 
040 |a SzZUIDS  |b ger  |c CHVBK  |d OCLCO 
049 |a GWRE 
050 4 |a QA76.9.A25 
245 0 0 |a Topics in Cryptology -- CT-RSA 2015  |h [Elektronische Daten] :  |b The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings /  |c edited by Kaisa Nyberg. 
260 |a Cham :  |b Springer International Publishing,  |c 2015. 
300 |a Online-Ressource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 0 |a Lecture Notes in Computer Science ;  |v 9048. 
520 |a This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2015, CT-RSA 2015, held in San Francisco, CA, USA, in April 2015. The 26 papers presented in this volume were carefully reviewed and selected from 111 submissions. The focus of the track is on following subjects: timing attacks, design and analysis of block ciphers, attribute and identity based encryption, membership, secure and efficient implementation of AES based Cryptosystems, chosen ciphertext attacks in theory and practice, algorithms for solving hard problems, constructions of hash functions and message authentication codes, secure multiparty computation, authenticated encryption, detecting and tracing malicious activities, implentation attacks on exponentiation algorithms, and homomorphic encryption and its applications. 
650 0 |a Computer science. 
650 0 |a Computer networks. 
650 0 |a Data protection. 
650 0 |a Data encryption. 
650 0 |a Coding theory. 
700 1 |a Nyberg, Kaisa. 
856 4 1 |u https://colorado.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-319-16715-2  |z Full Text (via Springer) 
907 |a .b80429749  |b 07-02-19  |c 06-25-15 
998 |a web  |b 06-25-15  |c f  |d b   |e -  |f eng  |g gw   |h 0  |i 2 
956 |a Springer e-books non english cataloging 
956 |b Springer English/International eBooks 2015 - Full Set 
999 f f |i 0ecc1b95-0468-5d54-9842-03a61dc23c0c  |s afed7b24-dc1b-5d00-91e7-d2a82241350a 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i Ebooks, Prospector  |n 1