|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-3-319-31517-1 |
003 |
DE-He213 |
005 |
20220115055757.0 |
007 |
cr nn 008mamaa |
008 |
160407s2016 sz | s |||| 0|eng d |
020 |
|
|
|a 9783319315171
|9 978-3-319-31517-1
|
024 |
7 |
|
|a 10.1007/978-3-319-31517-1
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
1 |
0 |
|a Progress in Cryptology - AFRICACRYPT 2016
|h [electronic resource] :
|b 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /
|c edited by David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2016.
|
300 |
|
|
|a X, 369 p. 49 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 9646
|
505 |
0 |
|
|a Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure protocols.-Public-key cryptography.
|
520 |
|
|
|a This book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016. The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Information theory.
|
650 |
|
0 |
|a Numerical analysis.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Electronic data processing-Management.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Coding and Information Theory.
|
650 |
2 |
4 |
|a Numerical Analysis.
|
650 |
2 |
4 |
|a Theory of Computation.
|
650 |
2 |
4 |
|a IT Operations.
|
700 |
1 |
|
|a Pointcheval, David.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Nitaj, Abderrahmane.
|e editor.
|0 (orcid)0000-0002-0372-1757
|1 https://orcid.org/0000-0002-0372-1757
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Rachidi, Tajjeeddine.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319315164
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319315188
|
830 |
|
0 |
|a Security and Cryptology ;
|v 9646
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-3-319-31517-1
|z Texto Completo
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-SXCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (SpringerNature-11645)
|
950 |
|
|
|a Computer Science (R0) (SpringerNature-43710)
|