Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8957)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: Inscrypt 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- Anonymity
- Authentication
- Block cipher
- Cryptanalysis
- Cryptographic application
- Cryptographic primitive
- Elliptic curve cryptography
- Encryption
- Hash function
- Lattice cryptography
- Meet in the middle
- Multiparty computation
- Obfuscation
- Oblivious transfer
- Outsource computation
- Privacy
- Public key cryptography
- Security protocols
- Signature protocols
- zero knowledge
Table of contents (29 papers)
-
Multiparty and Outsource Computation
-
Signature and Security Protocols
-
Lattice and Public Key Cryptography
Editors and Affiliations
Bibliographic Information
Book Title: Information Security and Cryptology
Book Subtitle: 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers
Editors: Dongdai Lin, Moti Yung, Jianying Zhou
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-16745-9
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-16744-2Published: 08 April 2015
eBook ISBN: 978-3-319-16745-9Published: 27 March 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 547
Number of Illustrations: 92 b/w illustrations
Topics: Systems and Data Security, Cryptology, Coding and Information Theory, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science
Industry Sectors: Aerospace, Automotive, Biotechnology, Electronics, Engineering, Finance, Business & Banking, IT & Software, Law, Pharma, Telecommunications