Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers / [electronic resource] :
edited by Raphaël C.-W. Phan, Moti Yung.
- 1st ed. 2017.
- XI, 573 p. 84 illus. online resource.
- Security and Cryptology, 10311 2946-1863 ; .
- Security and Cryptology, 10311 .
Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .
9783319612737
10.1007/978-3-319-61273-7 doi
Cryptography.
Data encryption (Computer science).
Computer science--Mathematics.
Discrete mathematics.
Electronic data processing--Management.
Computer networks .
Algorithms.
Cryptology.
Discrete Mathematics in Computer Science.
IT Operations.
Computer Communication Networks.
Algorithms.
QA268
005.824
Revisiting tradition -- Different paradigms -- Cryptofication -- Malicious cryptography -- Advances in cryptanalysis -- Primitives and features; cryptanalysis correspondence.
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .
9783319612737
10.1007/978-3-319-61273-7 doi
Cryptography.
Data encryption (Computer science).
Computer science--Mathematics.
Discrete mathematics.
Electronic data processing--Management.
Computer networks .
Algorithms.
Cryptology.
Discrete Mathematics in Computer Science.
IT Operations.
Computer Communication Networks.
Algorithms.
QA268
005.824