Selected Areas in Cryptography - SAC 2018 [electronic resource] : 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers / edited by Carlos Cid, Michael J. Jacobson Jr.
Contributor(s): Cid, Carlos [editor.] | Jacobson Jr., Michael J [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 11349Publisher: Cham : Springer International Publishing : Imprint: Springer, 2019Edition: 1st ed. 2019.Description: XI, 499 p. 210 illus., 50 illus. in color. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783030109707.Subject(s): Data protection | Cryptography | Data encryption (Computer science) | Computer networks -- Security measures | Computer networks | Computer science -- Mathematics | Mathematical statistics | Data and Information Security | Cryptology | Mobile and Network Security | Security Services | Computer Communication Networks | Probability and Statistics in Computer ScienceAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access online In: Springer Nature eBookSummary: This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.This book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things.
There are no comments for this item.