Selected Areas in Cryptography [electronic resource] : 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers / edited by Alex Biryukov, Guang Gong, Douglas R. Stinson.
Contributor(s): Biryukov, Alex [editor.] | Gong, Guang [editor.] | Stinson, Douglas R [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 6544Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011Edition: 1st ed. 2011.Description: XIII, 411 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642195747.Subject(s): Cryptography | Data encryption (Computer science) | Operating systems (Computers) | Algorithms | Computer networks | Application software | Cryptology | Operating Systems | Algorithms | Computer Communication Networks | Computer and Information Systems ApplicationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.No physical items for this record
This book constitutes the thoroughly refereed post-proceedings of the 17th Annual International Workshop on Selected Areas in Cryptography, SAC 2010, held in Waterloo, Ontario, Canada in August 2010. The 24 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on hash functions, stream ciphers, efficient implementations, coding and combinatorics, block ciphers, side channel attacks, and mathematical aspects.
There are no comments for this item.