Home
Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
Barnes and Noble
Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
Current price: $54.99


Barnes and Noble
Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II
Current price: $54.99
Size: OS
Loading Inventory...
*Product information may vary - to confirm product availability, pricing, shipping and return information please contact Barnes and Noble
The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.
The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Prools; Side Channel Analysis; Pairing-based Prools; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Prools; Operating Modes Security Proofs; Cryptographic Prools; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.
The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Prools; Side Channel Analysis; Pairing-based Prools; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Prools; Operating Modes Security Proofs; Cryptographic Prools; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.