Topics in Cryptology - CT-RSA 2016 The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings / [electronic resource] :
edited by Kazue Sako.
- 1st ed. 2016.
- XI, 465 p. 68 illus. in color. online resource.
- Security and Cryptology, 9610 2946-1863 ; .
- Security and Cryptology, 9610 .
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.
9783319294858
10.1007/978-3-319-29485-8 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks .
Coding theory.
Information theory.
Algorithms.
Cryptology.
Data and Information Security.
Computer Communication Networks.
Coding and Information Theory.
Algorithms.
QA268
005.824
This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2016, CT-RSA 2016, held in San Francisco, CA, USA, in February/March 2016. The 26 papers presented in this volume were carefully reviewed and selected from 76 submissions. The focus of the track is on following subjects: secure key exchange schemes, authenticated encryption, searchable symmetric encryption, digital signatures with new functionality, secure multi party computation, how to verify procedures, side-channel attacks on elliptic curve cryptography, hardware attacks and security, structure-preserving signatures, lattice cryptography, cryptanalysis of symmetric key encryption, message authentication code and PRF-security, and security of public key encryption.
9783319294858
10.1007/978-3-319-29485-8 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computer networks .
Coding theory.
Information theory.
Algorithms.
Cryptology.
Data and Information Security.
Computer Communication Networks.
Coding and Information Theory.
Algorithms.
QA268
005.824