000 | 03192nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-030-10970-7 | ||
003 | DE-He213 | ||
005 | 20240730165219.0 | ||
007 | cr nn 008mamaa | ||
008 | 190112s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030109707 _9978-3-030-10970-7 |
||
024 | 7 |
_a10.1007/978-3-030-10970-7 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aSelected Areas in Cryptography - SAC 2018 _h[electronic resource] : _b25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers / _cedited by Carlos Cid, Michael J. Jacobson Jr. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXI, 499 p. 210 illus., 50 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11349 |
|
520 | _aThis book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _93969 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aMathematical statistics. _99597 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aMobile and Network Security. _933624 |
650 | 2 | 4 |
_aSecurity Services. _978910 |
650 | 2 | 4 |
_aComputer Communication Networks. _987874 |
650 | 2 | 4 |
_aProbability and Statistics in Computer Science. _931857 |
700 | 1 |
_aCid, Carlos. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987876 |
|
700 | 1 |
_aJacobson Jr., Michael J. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _987877 |
|
710 | 2 |
_aSpringerLink (Online service) _987879 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030109691 |
776 | 0 | 8 |
_iPrinted edition: _z9783030109714 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11349 _987881 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-10970-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c86164 _d86164 |