Selected areas in cryptography -- SAC 2014 : 21st International Conference, Montreal, QC, Canada, August 14-15, 2014 : revised selected papers /

Saved in:
Bibliographic Details
Meeting name:SAC (Conference) (21st : 2014 : Montréal, Québec)
Imprint:Cham : Springer, [2014]
©2014
Description:1 online resource.
Language:English
Series:Lecture Notes in Computer Science, 0302-9743 ; 8781
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 8781.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11090419
Hidden Bibliographic Details
Varying Form of Title:SAC 2014
Other authors / contributors:Joux, Antoine, editor.
Youssef, Amr, editor.
ISBN:9783319130514
331913051X
9783319130507
3319130501
Summary:This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
Other form:Printed edition: 9783319130507
Standard no.:10.1007/978-3-319-13051-4
Description
Summary:This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014.<br> The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.
Physical Description:1 online resource.
ISBN:9783319130514
331913051X
9783319130507
3319130501
ISSN:0302-9743
;