by Xuejia Lai (Editor), Kefei Chen (Editor)
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptology and Information Security, held in Shanghai, China, December 2006. The 30 revised full papers cover attacks on hash functions, stream ciphers, biometrics and ECC computation, id-based schemes, public-key schemes, RSA and factorization, construction of hash function, protocols, block ciphers, and signatures.
Format: Illustrated
Pages: 484
Edition: 2006
Publisher: Springer
Published: 22 Nov 2006
ISBN 10: 3540494758
ISBN 13: 9783540494751