Listing 1 - 4 of 4 |
Sort by
|
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Computer science. --- Data encryption (Computer science) --- Data protection. --- Computer software. --- Computational complexity. --- Information Systems. --- Mathematics. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Engineering & Applied Sciences --- Computer Science --- Math --- Complexity, Computational --- Software, Computer --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer Science. --- Computer security --- Cryptology. --- Science --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Machine theory --- Cryptography --- Protection --- Security measures --- Computer science—Mathematics. --- Engineering --- Engineering analysis --- Mathematical analysis --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Mathematics --- Communication systems --- Foundations
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Computational complexity. --- Information Systems. --- Mathematics. --- Computer Science. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Discrete Mathematics in Computer Science. --- Systems and Data Security. --- Applications of Mathematics. --- Engineering & Applied Sciences --- Computer Science --- Informatics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Math --- Complexity, Computational --- Software, Computer --- Computer security. --- Algorithms. --- Computer science --- Management information systems. --- Applied mathematics. --- Engineering mathematics. --- Computer security --- Data encryption (Computer science) --- Cryptology. --- Computer systems --- Cryptography --- Science --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electronic data processing --- Machine theory --- Protection --- Security measures --- Computer science—Mathematics. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Engineering --- Engineering analysis --- Mathematical analysis --- Communication systems --- Foundations --- Mathematics
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste wiskunde --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- wachtwoorden (informatica) --- computers --- informatica --- informatiesystemen --- wiskunde --- computerbeveiliging --- informatica management --- computerkunde
Choose an application
The two-volume set LNCS 8269 and 8270 constitutes the refereed proceedings of the 19th International Conference on the Theory and Application of Cryptology and Information, Asiacrypt 2013, held in Bengaluru, India, in December 2013. The 54 revised full papers presented were carefully selected from 269 submissions. They are organized in topical sections named: zero-knowledge, algebraic cryptography, theoretical cryptography, protocols, symmetric key cryptanalysis, symmetric key cryptology: schemes and analysis, side-channel cryptanalysis, message authentication codes, signatures, cryptography based upon physical assumptions, multi-party computation, cryptographic primitives, analysis, cryptanalysis and passwords, leakage-resilient cryptography, two-party computation, hash functions.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste wiskunde --- complexiteit --- DES (data encryption standard) --- discrete wiskunde --- cryptologie --- complexe analyse (wiskunde) --- bedrijfssoftware --- wachtwoorden (informatica) --- computers --- informatica --- informatiesystemen --- wiskunde --- computerbeveiliging --- informatica management --- computerkunde
Listing 1 - 4 of 4 |
Sort by
|