This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.
Imprint | Springer-Verlag |
Country of origin | Germany |
Series | Lecture Notes in Computer Science, 4284 |
Release date | November 2006 |
Availability | Expected to ship within 10 - 15 working days |
First published | 2006 |
Editors | Xuejia Lai, Kefei Chen |
Dimensions | 235 x 155 x 24mm (L x W x T) |
Format | Paperback |
Pages | 470 |
Edition | 2006 ed. |
ISBN-13 | 978-3-540-49475-1 |
Barcode | 9783540494751 |
Categories | |
LSN | 3-540-49475-8 |