Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/778
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdams, Carlisle. ;en_US
dc.contributor.authorCamenisch, Jan. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:21:56Z-
dc.date.available2020-05-17T08:21:56Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319725659 ;en_US
dc.identifier.isbn9783319725642 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/778-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319725642. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017.e The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms. ;en_US
dc.description.statementofresponsibilityedited by Carlisle Adams, Jan Camenisch.en_US
dc.description.tableofcontentsInformation Security -- Cryptography -- Bock Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Authenticated Encryption -- Post-Quantum Cryptography -- Efficient Implementations. Public key Cryptography -- Applied Cryptography. ;en_US
dc.format.extentXI, 459 p. 70 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10719. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10719. ;en_US
dc.relation.haspart9783319725642.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectSoftware Engineeringen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputer Scienceen_US
dc.subjectData Encryption. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ;en_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleSelected Areas in Cryptography ee SAC 2017en_US
dc.title.alternative24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319725642.pdf15.44 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdams, Carlisle. ;en_US
dc.contributor.authorCamenisch, Jan. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:21:56Z-
dc.date.available2020-05-17T08:21:56Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319725659 ;en_US
dc.identifier.isbn9783319725642 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/778-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319725642. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017.e The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms. ;en_US
dc.description.statementofresponsibilityedited by Carlisle Adams, Jan Camenisch.en_US
dc.description.tableofcontentsInformation Security -- Cryptography -- Bock Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Authenticated Encryption -- Post-Quantum Cryptography -- Efficient Implementations. Public key Cryptography -- Applied Cryptography. ;en_US
dc.format.extentXI, 459 p. 70 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10719. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10719. ;en_US
dc.relation.haspart9783319725642.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectSoftware Engineeringen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputer Scienceen_US
dc.subjectData Encryption. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ;en_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleSelected Areas in Cryptography ee SAC 2017en_US
dc.title.alternative24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319725642.pdf15.44 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAdams, Carlisle. ;en_US
dc.contributor.authorCamenisch, Jan. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:21:56Z-
dc.date.available2020-05-17T08:21:56Z-
dc.date.issued2018en_US
dc.identifier.isbn9783319725659 ;en_US
dc.identifier.isbn9783319725642 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/778-
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319725642. ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017.e The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms. ;en_US
dc.description.statementofresponsibilityedited by Carlisle Adams, Jan Camenisch.en_US
dc.description.tableofcontentsInformation Security -- Cryptography -- Bock Ciphers -- Stream Ciphers -- Hash Functions -- Message Authentication Codes -- Authenticated Encryption -- Post-Quantum Cryptography -- Efficient Implementations. Public key Cryptography -- Applied Cryptography. ;en_US
dc.format.extentXI, 459 p. 70 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10719. ;en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10719. ;en_US
dc.relation.haspart9783319725642.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectSoftware Engineeringen_US
dc.subjectData encryption (Computer science). ;en_US
dc.subjectArtificial Intelligenceen_US
dc.subjectComputer Scienceen_US
dc.subjectData Encryption. ;en_US
dc.subjectArtificial Intelligence and Roboticsen_US
dc.subjectSoftware Engineering/Programming and Operating Systems. ;en_US
dc.subject.ddc005.82 ; 23 ;en_US
dc.titleSelected Areas in Cryptography ee SAC 2017en_US
dc.title.alternative24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers /en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
Appears in Collections:مدیریت فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319725642.pdf15.44 MBAdobe PDFThumbnail
Preview File