Editors:
unique visibility, state-of-the-art research,
fast-track conference proceedings
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6477)
Part of the book sub series: Security and Cryptology (LNSC)
Conference series link(s): ASIACRYPT: International Conference on the Theory and Application of Cryptology and Information Security
Conference proceedings info: ASIACRYPT 2010.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsThis is a preview of subscription content, access via your institution.
Table of contents (35 papers)
-
Front Matter
-
Hash Attacks
-
Zero-Knowledge
Keywords
- DES
- Skein
- Tiger
- Zero Knowledge
- algebraic cryptanalysis
- block ciphers
- complexity
- cryptanalysis
- cryptographic assumptions
- cryptography
- differential cryptanalysis
- encryption schemes
- information security
- linear codes
- rotational cryptanalysis
- algorithm analysis and problem complexity
Editors and Affiliations
-
, Tokyo, Japan
Masayuki Abe
Bibliographic Information
Book Title: Advances in Cryptology - ASIACRYPT 2010
Book Subtitle: 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings
Editors: Masayuki Abe
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-642-17373-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: International Association for Cryptologic Research 2010
Softcover ISBN: 978-3-642-17372-1Published: 16 November 2010
eBook ISBN: 978-3-642-17373-8Published: 02 December 2010
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIV, 634
Number of Illustrations: 70 b/w illustrations
Topics: Cryptology, Algorithms, IT Operations, Discrete Mathematics in Computer Science, Data and Information Security, Applications of Mathematics