|
|
|
|
LEADER |
01969nmm a2200397 u 4500 |
001 |
EB001087701 |
003 |
EBX01000000000000000847065 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
160104 ||| eng |
020 |
|
|
|a 9783319272399
|
100 |
1 |
|
|a Groth, Jens
|e [editor]
|
245 |
0 |
0 |
|a Cryptography and Coding
|h Elektronische Ressource
|b 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings
|c edited by Jens Groth
|
250 |
|
|
|a 1st ed. 2015
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2015, 2015
|
300 |
|
|
|a X, 329 p. 42 illus. in color
|b online resource
|
505 |
0 |
|
|a Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience
|
653 |
|
|
|a Coding and Information Theory
|
653 |
|
|
|a Coding theory
|
653 |
|
|
|a Computer science / Mathematics
|
653 |
|
|
|a Discrete Mathematics in Computer Science
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Algorithms
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Information theory
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Discrete mathematics
|
653 |
|
|
|a Data and Information Security
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-319-27239-9
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-27239-9?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.824
|
520 |
|
|
|a This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience
|