000 | 03051nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-21969-6 | ||
003 | DE-He213 | ||
005 | 20240730192447.0 | ||
007 | cr nn 008mamaa | ||
008 | 110628s2011 gw | s |||| 0|eng d | ||
020 |
_a9783642219696 _9978-3-642-21969-6 |
||
024 | 7 |
_a10.1007/978-3-642-21969-6 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProgress in Cryptology -- AFRICACRYPT 2011 _h[electronic resource] : _b4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings / _cedited by Abderrahmane Nitaj, David Pointcheval. |
250 | _a1st ed. 2011. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2011. |
|
300 |
_aXIII, 387 p. 52 illus., 8 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v6737 |
|
520 | _aThis book constitutes the refereed proceedings of the 4th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2011, held in Dakar, Senegal, in July 2011. The 23 papers presented together with abstracts of 3 invited talks were carefully reviewed and selected from 76 submissions. They are organized in topical sections on protocols, cryptanalysis, secret-key cryptography, efficient implementations, cryptographic schemes, algorithmic problems, elliptic curves, fault analysis, and security proofs. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aElectronic data processing _xManagement. _9150041 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aOperating systems (Computers). _95329 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9150042 |
650 | 2 | 4 |
_aIT Operations. _931703 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aOperating Systems. _937074 |
700 | 1 |
_aNitaj, Abderrahmane. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9150043 |
|
700 | 1 |
_aPointcheval, David. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9150044 |
|
710 | 2 |
_aSpringerLink (Online service) _9150045 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642219689 |
776 | 0 | 8 |
_iPrinted edition: _z9783642219702 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v6737 _9150046 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-21969-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c94264 _d94264 |