|
|
|
|
LEADER |
03299nam a2200601 4500 |
001 |
978-3-030-25283-0 |
003 |
DE-He213 |
005 |
20191025182642.0 |
007 |
cr nn 008mamaa |
008 |
190719s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030252830
|9 978-3-030-25283-0
|
024 |
7 |
|
|a 10.1007/978-3-030-25283-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D335
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
082 |
0 |
4 |
|a 005.82
|2 23
|
245 |
1 |
0 |
|a Progress in Cryptology - LATINCRYPT 2017
|h [electronic resource] :
|b 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers /
|c edited by Tanja Lange, Orr Dunkelman.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a XIII, 415 p. 635 illus., 24 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11368
|
520 |
|
|
|a This book constitutes the refereed post-conference proceedings of the 5th International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2017, held in Havana, Cuba, in September 2017. The 20 papers presented were carefully reviewed and selected from 64 submissions. They are organized in the following topical sections: security protocols; public-key implementation; cryptanalysis; theory of symmetric-key cryptography; multiparty computation and privacy; new constructions; and adversarial cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
650 |
|
0 |
|a Logic design.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
1 |
4 |
|a Cryptology.
|0 http://scigraph.springernature.com/things/product-market-codes/I28020
|
650 |
2 |
4 |
|a Software Engineering.
|0 http://scigraph.springernature.com/things/product-market-codes/I14029
|
650 |
2 |
4 |
|a Computers and Society.
|0 http://scigraph.springernature.com/things/product-market-codes/I24040
|
650 |
2 |
4 |
|a Information Systems Applications (incl. Internet).
|0 http://scigraph.springernature.com/things/product-market-codes/I18040
|
650 |
2 |
4 |
|a Logic Design.
|0 http://scigraph.springernature.com/things/product-market-codes/I12050
|
650 |
2 |
4 |
|a Coding and Information Theory.
|0 http://scigraph.springernature.com/things/product-market-codes/I15041
|
700 |
1 |
|
|a Lange, Tanja.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Dunkelman, Orr.
|e editor.
|0 (orcid)0000-0001-5799-2635
|1 https://orcid.org/0000-0001-5799-2635
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030252823
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030252847
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11368
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-25283-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|