Enter your search into one or more of the boxes below:
You can refine your search by selecting from any of the options below:
Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings

Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings (Paperback)

Printed to order. Despatched in 2-3 weeks.
Email me when back in stock


ASIACRYPT 2003 was held in Taipei, Taiwan, from Nov. 30 to Dec. 4, 2003. The 9th Annual ASIACRYPT conference was sponsored by the International Association for Cryptologic Research (IACR), this year in cooperation with the ChineseCryptologyandInformationSecurityAssociation(CCISA)andNational Cheng Kung University (NCKU) in Taiwan. One hundred and eighty-eight papers from 26 countries were submitted to ASIACRYPT 2003 and 33 (of which one paper was withdrawn by the authors afternoti?cation)ofthesewereselectedforpresentation.Theseproceedingsc- tainrevisedversionsoftheacceptedpapers.WehadanIACR2003Distinguished Lecture, by Dr. Don Coppersmith, entitled "Solving Low Degree Polynomials." In addition, two invited talks were given at the conference. One was given by Dr. Adi Shamir. The other one was given by Dr. Hong-Sen Yan, entitled "The Secret and Beauty of Ancient Chinese Locks." The conference program also included a rump session, chaired by Tzong Chen Wu, which featured short informal talks on recent results. It was a pleasure for me to work with the program committee, which was composed of 27 members from 17 countries; I thank them for working very hard overseveralmonths.Asamatteroffact,thereviewprocesswasachallengingand time-consuming task, and it lasted about 8 weeks, followed by more than half a month for discussions among the program committee members.

All submissions were anonymously reviewed by at least 3 members in the relevant areas of the program committee; in some cases, particularly for those papers submitted by a member of the program committee, they were reviewed by at least six members. We are grateful to all the program committee members who put in a lot of e?ort andprecioustimegivingtheirexpertanalysisandcommentsonthesubmissions.

Computing & ITComputer securityData encryptionReference & ResearchResearch & information: generalCoding theory & cryptology Publisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Publication Date: 18/11/2003 ISBN-13: 9783540205920  Details: Type: Paperback Format: Books
Availability: Printed to order. Despatched in 2-3 weeks.  

More books by Chi Sung Laih

Leave Review


Delivery Options

All delivery times quoted are the average, and cannot be guaranteed. These should be added to the availability message time, to determine when the goods will arrive. During checkout we will give you a cumulative estimated date for delivery.

Location 1st Book Each additional book Average Delivery Time
UK Standard Delivery FREE FREE 3-5 Days
UK First Class £4.50 £1.00 1-2 Days
UK Courier £7.00 £1.00 1-2 Days
Western Europe** Courier £17.00 £3.00 2-3 Days
Western Europe** Airmail £5.00 £1.50 4-14 Days
USA / Canada Courier £20.00 £3.00 2-4 Days
USA / Canada Airmail £7.00 £3.00 4-14 Days
Rest of World Courier £22.50 £3.00 3-6 Days
Rest of World Airmail £8.00 £3.00 7-21 Days

** Includes Austria, Belgium, Denmark, France, Germany, Greece, Iceland, Irish Republic, Italy, Luxembourg, Netherlands, Portugal, Spain, Sweden and Switzerland.

Delivery Help & FAQs

Returns Information

If you are not completely satisfied with your purchase*, you may return it to us in its original condition with in 30 days of receiving your delivery or collection notification email for a refund. Except for damaged items or delivery issues the cost of return postage is borne by the buyer. Your statutory rights are not affected.

* For Exclusions and terms on damaged or delivery issues see Returns Help & FAQs

You might also like

Software Design X-Rays
Adam Tornhill
Enterprise Cybersecurity Study Guide:...
Scott E. Donaldson; Stanley G. ...
The Truth Machine: The Blockchain and...
Michael J. Casey; Paul Vigna
Ethical and Social Issues in the...
Joseph Migga Kizza
Latest Blog
Read an extract from Olivia Sudjic's Sympathy

Olivia Sudjic's debut novel Sympathy has been called the first great Instagram novel. Read an extract from this story of obsession and identity.

#FoylesFive: Portugese Foyles Five

With the anniversary of the Carnation Revolution upon us, Gary from our Fiction department shares a few tips for getting to know Portugal better...

Max Porter on the Portobello Prize

What makes great non-fiction? And how do you tell a true story? To celebrate the inaugural Portobello Prize for Narrative Non-Fiction, on 1st May 2018 we're hosting an evening with Portobello Books — a panel discussion on the nature of non-fiction writing in today's literary landscape, followed by the announcement of the first ever winner of the Prize.

View all Blog Entries
Show/Hide Tweets
© W&G Foyle Ltd