Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8479)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: ACNS 2014.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- RSA
- authenticated key exchange
- cryptanalysis and other attacks
- cryptographic primitives
- cryptography
- hash functions
- intrusion detection
- key management
- mathematical foundations of cryptography
- network security
- public key techniques
- secure computation
- security services
- signatures
- software and application security
- symmetric cryptography
- systems security
Table of contents (33 papers)
-
Hashing
-
Cryptanalysis & Attacks (Symmetric Cryptography)
Other volumes
-
Applied Cryptography and Network Security
Editors and Affiliations
Bibliographic Information
Book Title: Applied Cryptography and Network Security
Book Subtitle: 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings
Editors: Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-07536-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Softcover ISBN: 978-3-319-07535-8Published: 01 July 2014
eBook ISBN: 978-3-319-07536-5Published: 05 June 2014
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XVIII, 586
Number of Illustrations: 127 b/w illustrations
Topics: Systems and Data Security, Cryptology, Theory of Computation