Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.-Secure computation
Summary
This book constitutes the refereed proceedings of the 12th International Conference on Applied Cryptography and Network Security, ACNS 2014, held in Lausanne, Switzerland, in June 2014. The 33 revised full papers included in this volume were carefully reviewed and selected from 147 submissions. They are organized in topical sections on key exchange; primitive construction; attacks (public-key cryptography); hashing; cryptanalysis and attacks (symmetric cryptography); network security; signatures; system security; and secure computation
Analysis
computerwetenschappen
computer sciences
computertechnieken
computer techniques
computational science
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes
International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed June 17, 2014)