LEADER 03437nam 22007935 450 001 996213649103316 005 20230412071143.0 010 $a3-319-12087-5 024 7 $a10.1007/978-3-319-12087-4 035 $a(CKB)3710000000269687 035 $a(SSID)ssj0001372666 035 $a(PQKBManifestationID)11761810 035 $a(PQKBTitleCode)TC0001372666 035 $a(PQKBWorkID)11304865 035 $a(PQKB)10479854 035 $a(DE-He213)978-3-319-12087-4 035 $a(MiAaPQ)EBC6302378 035 $a(MiAaPQ)EBC5577550 035 $a(Au-PeEL)EBL5577550 035 $a(OCoLC)895036151 035 $a(PPN)182097757 035 $a(EXLCZ)993710000000269687 100 $a20141024d2014 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology$b[electronic resource] $e9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /$fedited by Dongdai Lin, Shouhuai Xu, Moti Yung 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XIII, 408 p. 51 illus.) 225 1 $aSecurity and Cryptology ;$v8567 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-319-12086-7 327 $aBoolean Function and Block Cipher -- Sequence and Stream Cipher -- Applications: Systems and Theory -- Computational Number Theory -- Public Key Cryptography -- Hash Function -- Side-Channel and Leakage -- Application and System Security. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 9th International Conference on Information Security and Cryptology, Inscrypt 2013, held in Guangzhou, China, in November 2013. The 21 revised full papers presented together with 4 short papers were carefully reviewed and selected from 93 submissions. The papers cover the topics of Boolean function and block cipher, sequence and stream cipher, applications: systems and theory, computational number theory, public key cryptography, has function, side-channel and leakage, and application and system security. 410 0$aSecurity and Cryptology ;$v8567 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aAlgorithms 606 $aData and Information Security 606 $aCryptology 606 $aCoding and Information Theory 606 $aAlgorithms 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aAlgorithms. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aCoding and Information Theory. 615 24$aAlgorithms. 676 $a005.82 702 $aLin$b Dongdai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aXu$b Shouhuai$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996213649103316 996 $aInformation Security and Cryptology$9772230 997 $aUNISA