Selected Areas in Cryptography - SAC 2015 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers / [electronic resource] :
edited by Orr Dunkelman, Liam Keliher.
- 1st ed. 2016.
- XIX, 528 p. 117 illus. online resource.
- Security and Cryptology, 9566 2946-1863 ; .
- Security and Cryptology, 9566 .
This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.
9783319313016
10.1007/978-3-319-31301-6 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Algorithms.
Coding theory.
Information theory.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
Algorithms.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
QA268
005.824
This book contains revised selected papers from the 22nd International Conference on Selected Areas in Cryptography, SAC 2015, held in Sackville, NB, Canada in August 2015. The 26 full papers and 3 short papers presented in this volume were carefully reviewed and selected from 91 submissions. They are organized in topical sections named: privacy enhancing technologies; cryptanalysis of symmetric-key primitives; implementation of cryptographic schemes; short papers; privacy preserving data processing; side channel attacks and defenses; new cryptographic constructions; authenticated encryption; on the hardness of mathematical problems; and cryptanalysis of authenticated encryption schemes.
9783319313016
10.1007/978-3-319-31301-6 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Algorithms.
Coding theory.
Information theory.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Data and Information Security.
Algorithms.
Coding and Information Theory.
Discrete Mathematics in Computer Science.
QA268
005.824