Advances in Cryptology ��� ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I /

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks present...

Full description

Bibliographic Details
Main Author: Sarkar, Palash
Corporate Author: SpringerLink (Online service)
Other Authors: Iwata, Tetsu
Format: Electronic Book
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2014
Series:Lecture notes in computer science ; 8873
Lecture notes in computer science ; 8874
Subjects:
LEADER 04156nam a22006375i 4500
001 a7c7015b-de3b-44ea-bea8-491e5adaf9a5
005 20230618000000.0
008 141106s2014^^^^gw^|^^^^o^^^^||||^0|eng^d
020 |a 9783662456071 
020 |a 9783662456088 
020 |a 9783662456101 
020 |a 9783662456118 
024 7 |a 10.1007/978-3-662-45608-8  |2 doi 
024 7 |a 10.1007/978-3-662-45611-8  |2 doi 
035 |a (WaSeSS)ssj0001386310 
035 |a (WaSeSS)ssj0001386311 
040 |d WaSeSS 
050 4 |a QA76.9.A25 
072 7 |a COM053000  |2 bisacsh 
072 7 |a URY  |2 bicssc 
082 0 4 |a 005.82  |2 23 
100 1 |a Sarkar, Palash 
245 1 0 |a Advances in Cryptology ��� ASIACRYPT 2014  |h [electronic resource] :  |b 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I /  |c edited by Palash Sarkar, Tetsu Iwata 
260 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2014 
300 |a 1 online resource (XX, 574 p. 74 illus.)  |b online resource 
300 |a 1 online resource (XXII, 528 p. 76 illus.)  |b online resource 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8873 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8874 
505 0 |a Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation 
520 |a The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation 
650 0 |a Coding theory 
650 0 |a Computer science 
650 0 |a Data encryption (Computer science) 
650 0 |a Data protection 
650 0 |a Information storage and retrieval systems 
650 0 |a Information theory 
650 1 4 |a Computer Science 
650 2 4 |a Coding and Information Theory 
650 2 4 |a Data Encryption 
650 2 4 |a Management of Computing and Information Systems 
650 2 4 |a Mathematics of Computing 
650 2 4 |a Systems and Data Security 
650 2 4 |a Theory of Computation 
655 7 |a Electronic books  |2 lcgft 
700 1 |a Iwata, Tetsu 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662456071 
776 0 8 |i Printed edition:  |z 9783662456101 
830 0 |a Lecture notes in computer science ;  |v 8873  |x 0302-9743 
830 0 |a Lecture notes in computer science ;  |v 8874  |x 0302-9743 
999 1 0 |i a7c7015b-de3b-44ea-bea8-491e5adaf9a5  |l 006502912  |s US-NCD  |m advances_in_cryptology_���_asiacrypt_201420th_international_conferenceelect2014_______sprina________________________________________sarkar__palash_____________________e 
999 1 0 |i a7c7015b-de3b-44ea-bea8-491e5adaf9a5  |l 006502913  |s US-NCD  |m advances_in_cryptology_���_asiacrypt_201420th_international_conferenceelect2014_______sprina________________________________________sarkar__palash_____________________e 
999 1 1 |l 006502912  |s ISIL:US-NCD  |t BKS  |a DUKIR  |x ITNET  |p UNLOANABLE 
999 1 1 |l 006502913  |s ISIL:US-NCD  |t BKS  |a DUKIR  |x ITNET  |p UNLOANABLE