Progress In Cryptology Indocrypt 2014
Download Progress In Cryptology Indocrypt 2014 full books in PDF, epub, and Kindle. Read online free Progress In Cryptology Indocrypt 2014 ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!
Author | : Willi Meier |
Publisher | : Springer |
Total Pages | : 455 |
Release | : 2014-10-24 |
Genre | : Computers |
ISBN | : 3319130390 |
This book constitutes the refereed proceedings of the 15th International Conference on Cryptology in India, INDOCRYPT 2014, held in New Delhi, India, in December 2014. The 25 revised full papers presented together with 4 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on side channel analysis; theory; block ciphers; cryptanalysis; efficient hardware design; protected hardware design; elliptic curves.
Author | : Alex Biryukov |
Publisher | : Springer |
Total Pages | : 381 |
Release | : 2015-11-27 |
Genre | : Computers |
ISBN | : 3319266179 |
This book constitutes the refereed proceedings of the 16th International Conference on Cryptology in India, INDOCRYPT 2015, held in Bangalore, India, in December 2015. The 19 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on public key encryption; cryptanalysis; side channel attacks; information theoretic cryptography; and lightweight cryptography.
Author | : Arpita Patra |
Publisher | : Springer |
Total Pages | : 416 |
Release | : 2017-12-02 |
Genre | : Computers |
ISBN | : 3319716670 |
This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.
Author | : Feng Hao |
Publisher | : Springer Nature |
Total Pages | : 589 |
Release | : 2019-12-09 |
Genre | : Computers |
ISBN | : 3030354237 |
This book constitutes the refereed proceedings of the 20th International Conference on Cryptology in India, INDOCRYPT 2019, held in Hyderabad, India, in December 2019. The 28 revised full papers presented in this book were carefully reviewed and selected from 110 submissions (of which 20 were either rejected without being reviewed or withdrawn before the deadline). The focus of the conference includes works on signatures and filter permutators; symmetric key ciphers and hash functions; blockchain, secure computation and blind coupon mechanism; oblivious transfer, obfuscation and privacy amplification; Boolean functions, elliptic curves and lattices; algorithms, attacks and distribution; and efficiency, side-channel resistance and PUFs.
Author | : Kristin Lauter |
Publisher | : Springer |
Total Pages | : 385 |
Release | : 2015-08-15 |
Genre | : Computers |
ISBN | : 3319221744 |
This book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols; foundations; post-quantum cryptography; symmetric key cryptanalysis; we still love pairings; curves in cryptography; and cryptographic engineering.
Author | : Anupam Chattopadhyay |
Publisher | : Springer Nature |
Total Pages | : 364 |
Release | : |
Genre | : |
ISBN | : 3031562321 |
Author | : Tetsu Iwata |
Publisher | : Springer |
Total Pages | : 809 |
Release | : 2015-11-26 |
Genre | : Computers |
ISBN | : 3662488000 |
The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015. The 64 revised full papers and 3 invited talks presented were carefully selected from 251 submissions. They are organized in topical sections on indistinguishability obfuscation; PRFs and hashes; discrete logarithms and number theory; signatures; multiparty computation; public key encryption; ABE and IBE; zero-knowledge; attacks on ASASA; number field sieve; hashes and MACs; symmetric encryption; foundations; side-channel attacks; design of block ciphers; authenticated encryption; symmetric analysis; cryptanalysis; privacy and lattices.
Author | : Antoine Joux |
Publisher | : Springer |
Total Pages | : 371 |
Release | : 2018-04-16 |
Genre | : Computers |
ISBN | : 3319893394 |
This book constitutes the refereed proceedings of the 10th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2018, held in Marrakesh, Morocco, in May 2018. The 19 papers presented in this book were carefully reviewed and selected from 54 submissions. AFRICACRYPT is a major scientific event that seeks to advance and promote the field of cryptology on the African continent. The conference has systematically drawn some excellent contributions to the field. The conference has always been organized in cooperation with the International Association for Cryptologic Research (IACR).
Author | : Dongdai Lin |
Publisher | : Springer |
Total Pages | : 487 |
Release | : 2016-05-06 |
Genre | : Computers |
ISBN | : 3319388983 |
This book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
Author | : Valerie Nachef |
Publisher | : Springer |
Total Pages | : 310 |
Release | : 2017-02-21 |
Genre | : Computers |
ISBN | : 3319495305 |
This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.