Overview
- Includes supplementary material: sn.pub/extras
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 9048)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: CT-RSA 2015.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
- Authorization
- Block and Stream Ciphers
- Cryptanalysis and other attacks
- Cryptography
- Digital rights management
- Digital signatures
- Hash functions and message authentication codes
- Information
- Intrusion/anomaly detection and malware mitigation
- Key management
- Mathematical foundations of cryptography
- Privacy-preserving protocols
- Pseudonymity, anonymity and untraceability
- Public key (asymmetric) techniques
- Public key encryption
- Quantum cryptography
- Security in hardware
- Side-channel analysis and countermeasures
- Software security engineering
- Symmetric cryptography and hash functions
- Theoretic techniques
Table of contents (26 papers)
-
Timing Attacks
-
Design and Analysis of Block Ciphers
-
Secure and Efficient Implementation of AES Based Cryptosystems
-
Chosen Ciphertext Attacks in Theory and Practice
Other volumes
-
Topics in Cryptology –- CT-RSA 2015
Editors and Affiliations
Bibliographic Information
Book Title: Topics in Cryptology –- CT-RSA 2015
Book Subtitle: The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings
Editors: Kaisa Nyberg
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-319-16715-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2015
Softcover ISBN: 978-3-319-16714-5Published: 25 March 2015
eBook ISBN: 978-3-319-16715-2Published: 10 March 2015
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: XIII, 508
Number of Illustrations: 79 b/w illustrations
Topics: Cryptology, Systems and Data Security, Computer Communication Networks, Coding and Information Theory