Full metadata record
DC FieldValueLanguage
dc.contributor.editorRijmen, Vincent-
dc.contributor.editorRoy Chowdhury, Dipanwita-
dc.contributor.editorDas, Abhijit-
dc.date.accessioned2017-04-12T00:18:50Z-
dc.date.available2017-04-12T00:18:50Z-
dc.date.issued2008-
dc.identifier.isbn978-3-540-89753-8-
dc.identifier.urihttp://repository.vnu.edu.vn/handle/VNU_123/26428-
dc.description.abstractThis book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.-
dc.format.extent449 p.-
dc.language.isoenen_US
dc.publisherSpringeren_US
dc.subjectComputer Scienceen_US
dc.subjectSecurity and Cryptology-
dc.subject.ddc005.8-
dc.titleProgress in Cryptology - INDOCRYPT 2008en_US
dc.typeBooken_US
Appears in Collections:Khoa học máy tính & Công nghệ thông tin


  • 2613.pdf
    • Size : 7,75 MB

    • Format : Adobe PDF

    • View : 
    • Download : 
  • Full metadata record
    DC FieldValueLanguage
    dc.contributor.editorRijmen, Vincent-
    dc.contributor.editorRoy Chowdhury, Dipanwita-
    dc.contributor.editorDas, Abhijit-
    dc.date.accessioned2017-04-12T00:18:50Z-
    dc.date.available2017-04-12T00:18:50Z-
    dc.date.issued2008-
    dc.identifier.isbn978-3-540-89753-8-
    dc.identifier.urihttp://repository.vnu.edu.vn/handle/VNU_123/26428-
    dc.description.abstractThis book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008. The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.-
    dc.format.extent449 p.-
    dc.language.isoenen_US
    dc.publisherSpringeren_US
    dc.subjectComputer Scienceen_US
    dc.subjectSecurity and Cryptology-
    dc.subject.ddc005.8-
    dc.titleProgress in Cryptology - INDOCRYPT 2008en_US
    dc.typeBooken_US
    Appears in Collections:Khoa học máy tính & Công nghệ thông tin


  • 2613.pdf
    • Size : 7,75 MB

    • Format : Adobe PDF

    • View : 
    • Download : 


  • Loading...