
Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8282)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: SAC 2013.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- MAC algorithms
- RSA
- applied cryptology
- authentication
- block and stream ciphers
- cryptography
- discrete logarithms
- elliptic curve cryptography
- hash functions
- hyperelliptic curve cryptography
- lattices
- mathematical foundations of cryptography
- pairing
- public key algorithms
- public key encryption
- security and privacy
- security services
- side-channel attacks
- symmetric cryptography
- algorithm analysis and problem complexity
Table of contents (29 papers)
-
Invited Talk
-
Invited Talk
-
Discrete Logarithms
-
Stream Ciphers and Authenticated Encryption
-
Post--quantum (Hash-Based and System Solving)
Other volumes
-
Selected Areas in Cryptography -- SAC 2013
Editors and Affiliations
Bibliographic Information
Book Title: Selected Areas in Cryptography -- SAC 2013
Book Subtitle: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers
Editors: Tanja Lange, Kristin Lauter, Petr Lisoněk
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-662-43414-7
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2014
Softcover ISBN: 978-3-662-43413-0Published: 11 June 2014
eBook ISBN: 978-3-662-43414-7Published: 20 May 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XV, 590
Number of Illustrations: 107 b/w illustrations
Topics: Cryptology, Systems and Data Security, Algorithm Analysis and Problem Complexity, Coding and Information Theory