Paradigms in cryptology -- Mycrypt 2016 : malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers / Raphael C.-W. Phan, Moti Yung (eds.).
2017
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Paradigms in cryptology -- Mycrypt 2016 : malicious and exploratory cryptology : second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised selected papers / Raphael C.-W. Phan, Moti Yung (eds.).
Meeting Name
ISBN
9783319612737 (electronic book)
3319612735 (electronic book)
9783319612720
3319612735 (electronic book)
9783319612720
Published
Cham, Switzerland : Springer, 2017.
Language
English
Description
1 online resource (xi, 573 pages) : illustrations.
Item Number
10.1007/978-3-319-61273-7 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/24
Summary
This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. .
Note
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed July 21, 2017).
Added Author
Series
Lecture notes in computer science ; 10311.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Linked Resources
Record Appears in
Table of Contents
Revisiting tradition
Different paradigms
Cryptofication
Malicious cryptography
Advances in cryptanalysis
Primitives and features; cryptanalysis correspondence.
Different paradigms
Cryptofication
Malicious cryptography
Advances in cryptanalysis
Primitives and features; cryptanalysis correspondence.