Editors:
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5350)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security
Conference proceedings info: ASIACRYPT 2008.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (34 papers)
-
Front Matter
-
Invited Talk
-
Cryptographic Hash Functions II
About this book
Keywords
- anonymity
- block ciphers
- concurrent security
- cryptanalysis
- cryptographic attacks
- cryptographic protocols
- cryptography
- cryptology
- data security
- digital signature schemes
- electronic voting
- generic algorithms
- graph colorin
- hash function
- information security
- algorithm analysis and problem complexity
Editors and Affiliations
-
Department of Computing, Macquarie University, Sydney, Australia
Josef Pieprzyk
Bibliographic Information
Book Title: Advances in Cryptology - ASIACRYPT 2008
Book Subtitle: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008
Editors: Josef Pieprzyk
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-540-89255-7
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2008
Softcover ISBN: 978-3-540-89254-0Published: 13 November 2008
eBook ISBN: 978-3-540-89255-7Published: 02 December 2008
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 572
Topics: Cryptology, User Interfaces and Human Computer Interaction, Discrete Mathematics, Data and Information Security, Algorithms, IT Operations