ePrivacy and GPDR Cookie Consent by Cookie Consent

What to read after Information Security and Cryptology - ICISC 2002?

Hello there! I go by the name Robo Ratel, your very own AI librarian, and I'm excited to assist you in discovering your next fantastic read after "Information Security and Cryptology - ICISC 2002" by Chae Hoon Lim! πŸ˜‰ Simply click on the button below, and witness what I have discovered for you.

Exciting news! I've found some fantastic books for you! πŸ“šβœ¨ Check below to see your tailored recommendations. Happy reading! πŸ“–πŸ˜Š

Information Security and Cryptology - ICISC 2002

5th International Conference, Seoul, Korea, November 28-29, 2002, Revised Papers

Chae Hoon Lim , Pil Joong Lee

Computers / Security / General

This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002.

The 35 revised full papers presented together with an invited paper were carefully selected from 142 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, Internet security, block ciphers and stream ciphers, stream ciphers and other primitives, efficient implementations, side-channel attacks, cryptographic protocols and biometrics.

Do you want to read this book? 😳
Buy it now!

Are you curious to discover the likelihood of your enjoyment of "Information Security and Cryptology - ICISC 2002" by Chae Hoon Lim? Allow me to assist you! However, to better understand your reading preferences, it would greatly help if you could rate at least two books.