Advances in cryptology-- ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 : proceedings / Kaoru Kurosawa (ed.).
By: (13th : International Conference on the Theory and Application of Cryptology and Information Security (13th : 2007 : Kuching, Sarawak).
Contributor(s): Kurosawa, Kaoru.Material type: TextSeries: Springer.Lecture notes in computer science: 4833.; LNCS sublibrarySL 4Security and cryptology: Publisher: Berlin ; New York : Springer, c2007Description: 1 online resource (xiv, 581 p.) : ill.ISBN: 9783540769002; 3540769005; 9783540768999 (pbk.); 3540768998 (pbk.); 9786611342456; 6611342451.Other title: ASIACRYPT 2007 | 13th International Conference on the Theory and Application of Cryptology | Thirteenth International Conference on the Theory and Application of Cryptology | International Conference on the Theory and Application of Cryptology.Subject(s): Computer security -- Congresses | Cryptography -- CongressesAdditional physical formats: Print version:: Advances in cryptology-- ASIACRYPT 2007.LOC classification: QA76.9.A25 | I555 2007Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 I555 2007 (Browse shelf)||http://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-76900-2||Available||ocn191471461|
"International Association for Cryptology Research"--Cover.
Includes bibliographical references and index.
Number theory and elliptic curve -- Protocol -- Invited talk[s] -- Hash function design -- Group/broadcast cryptography -- MAC and implementation -- Multiparty computation -- Block ciphers -- Foundation -- Public key encryption -- Cryptanalysis.
Annotation This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The 33 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 223 submissions. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.
Description based on print version record.