9783662434130-366243413X-Selected Areas in Cryptography -- SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Security and Cryptology)

Selected Areas in Cryptography -- SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Security and Cryptology)

ISBN-13: 9783662434130
ISBN-10: 366243413X
Edition: 2014
Author: Tanja Lange, Kristin Lauter, Petr Lisoněk
Publication date: 2014
Publisher: Springer
Format: Paperback 605 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783662434130
ISBN-10: 366243413X
Edition: 2014
Author: Tanja Lange, Kristin Lauter, Petr Lisoněk
Publication date: 2014
Publisher: Springer
Format: Paperback 605 pages

Summary

Selected Areas in Cryptography -- SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Security and Cryptology) (ISBN-13: 9783662434130 and ISBN-10: 366243413X), written by authors Tanja Lange, Kristin Lauter, Petr Lisoněk, was published by Springer in 2014. With an overall rating of 3.6 stars, it's a notable title among other Information Theory (Computer Science, Network Security, Security & Encryption, Algorithms, Programming) books. You can easily purchase or rent Selected Areas in Cryptography -- SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used Information Theory books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the proceedings of the 20th International Conference on Selected Areas in Cryptography, SAC 2013, held in Burnaby, Canada, in August 2013. The 26 papers presented in this volume were carefully reviewed and selected from 98 submissions. They are organized in topical sections named: lattices; discrete logarithms; stream ciphers and authenticated encryption; post-quantum (hash-based and system solving); white box crypto; block ciphers; elliptic curves, pairings and RSA; hash functions and MACs; and side-channel attacks. The book also contains 3 full-length invited talks.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book