Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8874)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security
Conference proceedings info: ASIACRYPT 2014.
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (27 papers)
-
Front Matter
-
Outsourcing and Delegation
-
Obfuscation
-
Block Ciphers and Passwords
Other Volumes
-
Advances in Cryptology – ASIACRYPT 2014
About this book
Keywords
- cryptanalysis and other attacks
- cryptography
- hardware attacks and countermeasures
- information theory
- information-theoretic techniques
- key management
- mathematical foundations of cryptography
- mathematics of computing
- public key (asymmetric) techniques
- public key encryption
- security in hardware
- security services
- software and application security
- symmetric cryptography and hash functions
Editors and Affiliations
-
Applied Statistics Unit, Indian Statistical Institute, Kolkata,, India
Palash Sarkar
-
Nagoya University, Japan
Tetsu Iwata
Bibliographic Information
Book Title: Advances in Cryptology -- ASIACRYPT 2014
Book Subtitle: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, December 7-11, 2014, Part II
Editors: Palash Sarkar, Tetsu Iwata
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-45608-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2014
Softcover ISBN: 978-3-662-45607-1Published: 14 November 2014
eBook ISBN: 978-3-662-45608-8Published: 06 November 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XXII, 528
Number of Illustrations: 76 b/w illustrations
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Management of Computing and Information Systems, Theory of Computation, Mathematics of Computing
Industry Sectors: Aerospace, Electronics, Engineering, Finance, Business & Banking, IT & Software, Law, Telecommunications