Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

by Raphaël C.-W. Phan, Moti Yung
ISBN-10:
3319612727
ISBN-13:
9783319612720
Pub. Date:
08/18/2017
Publisher:
Springer International Publishing
ISBN-10:
3319612727
ISBN-13:
9783319612720
Pub. Date:
08/18/2017
Publisher:
Springer International Publishing
Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology: Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers

by Raphaël C.-W. Phan, Moti Yung
$54.99
Current price is , Original price is $54.99. You
$54.99 
  • SHIP THIS ITEM
    Not Eligible for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.

The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.


Product Details

ISBN-13: 9783319612720
Publisher: Springer International Publishing
Publication date: 08/18/2017
Series: Lecture Notes in Computer Science , #10311
Edition description: 1st ed. 2017
Pages: 573
Product dimensions: 6.10(w) x 9.25(h) x (d)

Table of Contents

Revisiting tradition.- Different paradigms.- Cryptofication.- Malicious cryptography.- Advances in cryptanalysis.- Primitives and features; cryptanalysis correspondence.
From the B&N Reads Blog

Customer Reviews