Condition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 50.43
Quantity: Over 20 available
Add to basketCondition: New. In.
PF. Condition: New.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: New.
Condition: New.
hardcover. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
Condition: As New. Unread book in perfect condition.
Condition: New. pp. 571.
Seller: Kennys Bookstore, Olney, MD, U.S.A.
Condition: New.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 82.44
Quantity: Over 20 available
Add to basketCondition: New. In.
Seller: Chiron Media, Wallingford, United Kingdom
Paperback. Condition: New.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. pp. 228.
Language: English
Published by Springer International Publishing, Springer International Publishing, 2017
ISBN 10: 3319612727 ISBN 13: 9783319612720
Seller: AHA-BUCH GmbH, Einbeck, Germany
Taschenbuch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.
Language: English
Published by Springer-Verlag New York Inc, 2017
ISBN 10: 3319612727 ISBN 13: 9783319612720
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 588 pages. 9.25x6.10x1.33 inches. In Stock.
Taschenbuch. Condition: Neu. Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology | Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers | Raphaël C. -W. Phan (u. a.) | Taschenbuch | Lecture Notes in Computer Science | xi | Englisch | 2017 | Springer | EAN 9783319612720 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 248.
Paperback. Condition: New. New. book.
Seller: Mispah books, Redhill, SURRE, United Kingdom
Paperback. Condition: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Seller: Mispah books, Redhill, SURRE, United Kingdom
Hardcover. Condition: Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book.
Language: English
Published by Springer International Publishing Jul 2017, 2017
ISBN 10: 3319612727 ISBN 13: 9783319612720
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence. 588 pp. Englisch.
Condition: New. Print on Demand pp. 571.
Condition: new. Questo è un articolo print on demand.
Condition: New. PRINT ON DEMAND pp. 571.
Language: English
Published by Springer International Publishing, 2017
ISBN 10: 3319612727 ISBN 13: 9783319612720
Seller: moluna, Greven, Germany
Kartoniert / Broschiert. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016. The 26 revised full papers, two short papers and two keynotes .
Language: English
Published by Springer, Springer Jul 2017, 2017
ISBN 10: 3319612727 ISBN 13: 9783319612720
Seller: buchversandmimpf2000, Emtmannsberg, BAYE, Germany
Taschenbuch. Condition: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book constitutes the refereed post-conference proceedings of the Second International Conference on Cryptology and Malicious Security, held in Kuala Lumpur, Malaysia, December 1-2, 2016.The 26 revised full papers, two short papers and two keynotes presented were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on revisiting tradition; different paradigms; cryptofication; malicious cryptography; advances in cryptanalysis; primitives and features; cryptanalysis correspondence.Springer-Verlag KG, Sachsenplatz 4-6, 1201 Wien 588 pp. Englisch.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand pp. 228.
Language: English
Published by Springer Berlin Heidelberg, 2016
ISBN 10: 3662525976 ISBN 13: 9783662525975
Seller: moluna, Greven, Germany
Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Technique described was one of the finalists in the NIST SHA3 competitionPresents technique in an accessible, yet rigorous, treatment Accessible introduction to the field of hash functionsTechnique described was one of the finali.
Language: English
Published by Springer Berlin Heidelberg, 2015
ISBN 10: 3662447568 ISBN 13: 9783662447567
Seller: moluna, Greven, Germany
Gebunden. Condition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Technique described was one of the finalists in the NIST SHA3 competitionPresents technique in an accessible, yet rigorous, treatment Accessible introduction to the field of hash functionsDr. Jean-Philippe Aumasson received his P.
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND pp. 228.