
Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 10626)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ASIACRYPT 2017.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
Similar content being viewed by others
Keywords
Table of contents (16 papers)
-
Asiacrypt 2017 Award Paper II
-
Cryptographic Protocols
-
Symmetric Key Designs
Other volumes
-
Advances in Cryptology – ASIACRYPT 2017
-
Advances in Cryptology – ASIACRYPT 2017
-
Advances in Cryptology – ASIACRYPT 2017
Editors and Affiliations
Bibliographic Information
Book Title: Advances in Cryptology – ASIACRYPT 2017
Book Subtitle: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III
Editors: Tsuyoshi Takagi, Thomas Peyrin
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-70700-6
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2017
Softcover ISBN: 978-3-319-70699-3Published: 17 November 2017
eBook ISBN: 978-3-319-70700-6Published: 22 November 2017
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 473
Number of Illustrations: 59 b/w illustrations, 10 illustrations in colour
Topics: Cryptology, Systems and Data Security, Coding and Information Theory, Management of Computing and Information Systems, Theory of Computation, Mathematics of Computing