The Resource Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)
Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)
Resource Information
The item Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
 Summary

 The twovolume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; blackbox separation; composability; multiparty computation
 The twovolume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; blackbox separation; composability; multiparty computation
 Language
 eng
 Contents

 Cryptology and coding theory  Authenticated encryption  Symmetric key cryptanalysis  Side channel analysis  Hyperelliptic curve cryptography  Factoring and discrete log  Cryptanalysis  Signatures  Zero knowledge  Encryption schemes  Outsourcing and delegation  Obfuscation  Homomorphic cryptography  Secret sharing  Block ciphers and passwords  Blackbox separation  Composability  Multiparty computation
 Cryptology and coding theory  Authenticated encryption  Symmetric key cryptanalysis  Side channel analysis  Hyperelliptic curve cryptography  Factoring and discrete log  Cryptanalysis  Signatures  Zero knowledge  Encryption schemes  Outsourcing and delegation  Obfuscation  Homomorphic cryptography  Secret sharing  Block ciphers and passwords  Blackbox separation  Composability  Multiparty computation
 Isbn
 9783662456071
 Label
 Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II
 Title
 Advances in Cryptology ? ASIACRYPT 2014
 Title remainder
 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II
 Statement of responsibility
 edited by Palash Sarkar, Tetsu Iwata
 Subject

 Information Systems
 Computer Science
 Data protection
 Coding theory
 Management of Computing and Information Systems
 Systems and Data Security
 Mathematics of Computing
 Coding and Information Theory
 Computer science
 Information theory
 Data encryption (Computer science)
 Theory of Computation
 Data Encryption
 Language
 eng
 Summary

 The twovolume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; blackbox separation; composability; multiparty computation
 The twovolume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; blackbox separation; composability; multiparty computation
 http://library.link/vocab/creatorName
 Sarkar, Palash
 Dewey number
 005.82
 LC call number
 QA76.9.A25
 http://library.link/vocab/relatedWorkOrContributorName

 Iwata, Tetsu
 SpringerLink (Online service)
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 8874
 http://library.link/vocab/subjectName

 Computer science
 Data protection
 Data encryption (Computer science)
 Coding theory
 Information theory
 Information Systems
 Computer Science
 Data Encryption
 Systems and Data Security
 Coding and Information Theory
 Management of Computing and Information Systems
 Theory of Computation
 Mathematics of Computing
 Label
 Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)
 Contents

 Cryptology and coding theory  Authenticated encryption  Symmetric key cryptanalysis  Side channel analysis  Hyperelliptic curve cryptography  Factoring and discrete log  Cryptanalysis  Signatures  Zero knowledge  Encryption schemes  Outsourcing and delegation  Obfuscation  Homomorphic cryptography  Secret sharing  Block ciphers and passwords  Blackbox separation  Composability  Multiparty computation
 Cryptology and coding theory  Authenticated encryption  Symmetric key cryptanalysis  Side channel analysis  Hyperelliptic curve cryptography  Factoring and discrete log  Cryptanalysis  Signatures  Zero knowledge  Encryption schemes  Outsourcing and delegation  Obfuscation  Homomorphic cryptography  Secret sharing  Block ciphers and passwords  Blackbox separation  Composability  Multiparty computation
 Control code
 OCM1bookssj0001386310
 Dimensions
 unknown
 Isbn
 9783662456071
 Isbn Type
 (print)
 Other control number
 10.1007/9783662456088
 Specific material designation
 remote
 System control number
 (WaSeSS)bookssj0001386310
 Label
 Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)
 Contents

 Cryptology and coding theory  Authenticated encryption  Symmetric key cryptanalysis  Side channel analysis  Hyperelliptic curve cryptography  Factoring and discrete log  Cryptanalysis  Signatures  Zero knowledge  Encryption schemes  Outsourcing and delegation  Obfuscation  Homomorphic cryptography  Secret sharing  Block ciphers and passwords  Blackbox separation  Composability  Multiparty computation
 Cryptology and coding theory  Authenticated encryption  Symmetric key cryptanalysis  Side channel analysis  Hyperelliptic curve cryptography  Factoring and discrete log  Cryptanalysis  Signatures  Zero knowledge  Encryption schemes  Outsourcing and delegation  Obfuscation  Homomorphic cryptography  Secret sharing  Block ciphers and passwords  Blackbox separation  Composability  Multiparty computation
 Control code
 OCM1bookssj0001386310
 Dimensions
 unknown
 Isbn
 9783662456071
 Isbn Type
 (print)
 Other control number
 10.1007/9783662456088
 Specific material designation
 remote
 System control number
 (WaSeSS)bookssj0001386310
Subject
 Coding and Information Theory
 Coding theory
 Computer Science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Data protection
 Information Systems
 Information theory
 Management of Computing and Information Systems
 Mathematics of Computing
 Systems and Data Security
 Theory of Computation
Member of
Library Links
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT201420th/MzQKnAOq3JE/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT201420th/MzQKnAOq3JE/">Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT201420th/MzQKnAOq3JE/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT201420th/MzQKnAOq3JE/">Advances in Cryptology ? ASIACRYPT 2014 : 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 711, 2014, Proceedings, Part II, edited by Palash Sarkar, Tetsu Iwata, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>