TY - BOOK AU - Sarkar,Palash AU - Iwata,Tetsu ED - SpringerLink (Online service) TI - Advances in Cryptology – ASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II T2 - Lecture Notes in Computer Science, SN - 9783662456088 AV - QA76.9.A25 U1 - 005.82 23 PY - 2014/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg, Imprint: Springer KW - Computer science KW - Data protection KW - Data encryption (Computer science) KW - Coding theory KW - Information theory KW - Information Systems KW - Computer Science KW - Data Encryption KW - Systems and Data Security KW - Coding and Information Theory KW - Management of Computing and Information Systems KW - Theory of Computation KW - Mathematics of Computing N1 - Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side channel analysis -- Hyperelliptic curve cryptography -- Factoring and discrete log -- Cryptanalysis -- Signatures -- Zero knowledge -- Encryption schemes -- Outsourcing and delegation -- Obfuscation -- Homomorphic cryptography -- Secret sharing -- Block ciphers and passwords -- Black-box separation -- Composability -- Multi-party computation N2 - The two-volume set LNCS 8873 and 8874 constitutes the refereed proceedings of the 20th International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2014, held in Kaoshiung, Taiwan, in December 2014. The 55 revised full papers and two invited talks presented were carefully selected from 255 submissions. They are organized in topical sections on cryptology and coding theory; authenticated encryption; symmetric key cryptanalysis; side channel analysis; hyperelliptic curve cryptography; factoring and discrete log; cryptanalysis; signatures; zero knowledge; encryption schemes; outsourcing and delegation; obfuscation; homomorphic cryptography; secret sharing; block ciphers and passwords; black-box separation; composability; multi-party computation UR - http://dx.doi.org/10.1007/978-3-662-45608-8 ER -