LEADER 03660nam 22006975 450 001 9910337567703321 005 20200703194423.0 010 $a3-030-10970-4 024 7 $a10.1007/978-3-030-10970-7 035 $a(CKB)4100000007463698 035 $a(DE-He213)978-3-030-10970-7 035 $a(MiAaPQ)EBC5924026 035 $a(PPN)233799540 035 $a(EXLCZ)994100000007463698 100 $a20190112d2019 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSelected Areas in Cryptography ? SAC 2018$b[electronic resource] $e25th International Conference, Calgary, AB, Canada, August 15?17, 2018, Revised Selected Papers /$fedited by Carlos Cid, Michael J. Jacobson Jr 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (XI, 499 p. 210 illus., 50 illus. in color.) 225 1 $aSecurity and Cryptology ;$v11349 311 $a3-030-10969-0 320 $aIncludes bibliographical references and index. 330 $aThis book contains revised selected papers from the 25th International Conference on Selected Areas in Cryptography, SAC 2018, held in Calgary, AB, Canada in August 2018. The 22 full papers presented in this volume were carefully reviewed and selected from 57 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes efficient implementations of symmetric and public key algorithms mathematical and algorithmic aspects of applied cryptology cryptography for the Internet of Things. 410 0$aSecurity and Cryptology ;$v11349 606 $aComputer security 606 $aData encryption (Computer science) 606 $aComputer networks$xSecurity measures 606 $aComputer communication systems 606 $aMathematical statistics 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aMobile and Network Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28050 606 $aSecurity Services$3https://scigraph.springernature.com/ontologies/product-market-codes/I28030 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aProbability and Statistics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17036 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aComputer networks$xSecurity measures. 615 0$aComputer communication systems. 615 0$aMathematical statistics. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aMobile and Network Security. 615 24$aSecurity Services. 615 24$aComputer Communication Networks. 615 24$aProbability and Statistics in Computer Science. 676 $a005.8 702 $aCid$b Carlos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJacobson Jr$b Michael J$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910337567703321 996 $aSelected Areas in Cryptography ? SAC 2018$92501994 997 $aUNINA