Atjaunināt sīkdatņu piekrišanu

Progress in Cryptology AFRICACRYPT 2016: 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings 1st ed. 2016 [Mīkstie vāki]

  • Formāts: Paperback / softback, 369 pages, height x width: 235x155 mm, weight: 5737 g, 49 Illustrations, black and white; X, 369 p. 49 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9646
  • Izdošanas datums: 08-Apr-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319315161
  • ISBN-13: 9783319315164
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 369 pages, height x width: 235x155 mm, weight: 5737 g, 49 Illustrations, black and white; X, 369 p. 49 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 9646
  • Izdošanas datums: 08-Apr-2016
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 3319315161
  • ISBN-13: 9783319315164
This book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016.





The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography.

Lattices.- Ellipticcurves.- Secret-key cryptanalysis.- Efficient implementations.- Secure protocols.-Public-keycryptography.