LEADER 03824nam 22008895 450 001 9910484699203321 005 20251226195313.0 010 $a3-319-31517-X 024 7 $a10.1007/978-3-319-31517-1 035 $a(CKB)3710000000653136 035 $a(SSID)ssj0001666049 035 $a(PQKBManifestationID)16455315 035 $a(PQKBTitleCode)TC0001666049 035 $a(PQKBWorkID)15000466 035 $a(PQKB)11031169 035 $a(DE-He213)978-3-319-31517-1 035 $a(MiAaPQ)EBC6298817 035 $a(MiAaPQ)EBC5577366 035 $a(Au-PeEL)EBL5577366 035 $a(OCoLC)946502279 035 $a(PPN)193443872 035 $a(EXLCZ)993710000000653136 100 $a20160407d2016 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology ? AFRICACRYPT 2016 $e8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings /$fedited by David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi 205 $a1st ed. 2016. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2016. 215 $a1 online resource (X, 369 p. 49 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v9646 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-31516-1 327 $aLattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure protocols.-Public-key cryptography. 330 $aThis book constitutes the thoroughly refereed proceedings of the 8th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2016, held in Fes, Morooco, in April 2016. The 18 papers presented in this book were carefully reviewed and selected from 65 submissions. The aim of Africacrypt 2016 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography. Topics of interest are such as lattices; elliptic curves; secret-key cryptanalysis; efficient implementations; secure protocols; and public-key cryptography. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v9646 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aNumerical analysis 606 $aComputer science 606 $aElectronic data processing$xManagement 606 $aData and Information Security 606 $aCryptology 606 $aCoding and Information Theory 606 $aNumerical Analysis 606 $aTheory of Computation 606 $aIT Operations 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aNumerical analysis. 615 0$aComputer science. 615 0$aElectronic data processing$xManagement. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aNumerical Analysis. 615 24$aTheory of Computation. 615 24$aIT Operations. 676 $a004 702 $aPointcheval$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNitaj$b Abderrahmane$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRachidi$b Tajjeeddine$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484699203321 996 $aProgress in Cryptology ? AFRICACRYPT 2016$92813568 997 $aUNINA