Advances in Cryptology -- ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II

The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks present...

Full description

Bibliographic Details
Other Authors: Sarkar, Palash (Editor), Iwata, Tetsu (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2014, 2014
Edition:1st ed. 2014
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02831nmm a2200433 u 4500
001 EB000901530
003 EBX01000000000000000698101
005 00000000000000.0
007 cr|||||||||||||||||||||
008 141202 ||| eng
020 |a 9783662456088 
100 1 |a Sarkar, Palash  |e [editor] 
245 0 0 |a Advances in Cryptology -- ASIACRYPT 2014  |h Elektronische Ressource  |b 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II  |c edited by Palash Sarkar, Tetsu Iwata 
250 |a 1st ed. 2014 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2014, 2014 
300 |a XXII, 528 p. 76 illus  |b online resource 
505 0 |a Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation 
653 |a Coding and Information Theory 
653 |a Coding theory 
653 |a Computer science 
653 |a Mathematics of Computing 
653 |a Computer science / Mathematics 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Information theory 
653 |a Data protection 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Theory of Computation 
653 |a Data and Information Security 
653 |a IT Operations 
700 1 |a Iwata, Tetsu  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/978-3-662-45608-8 
856 4 0 |u https://doi.org/10.1007/978-3-662-45608-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation