Advances in Cryptology -- CRYPTO 2015
35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I
Seiten
2015
|
1st ed. 2015
Springer Berlin (Verlag)
978-3-662-47988-9 (ISBN)
Springer Berlin (Verlag)
978-3-662-47988-9 (ISBN)
The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015.The 74 revised full papers presented were carefully reviewed and selected from 266 submissions. The papers are organized in the following topical sections: lattice-based cryptography; cryptanalytic insights; modes and constructions; multilinear maps and IO; pseudorandomness; block cipher cryptanalysis; integrity; assumptions; hash functions and stream cipher cryptanalysis; implementations; multiparty computation; zero-knowledge; theory; signatures; non-signaling and information-theoretic crypto; attribute-based encryption; new primitives; and fully homomorphic/functional encryption.
Lattice-based cryptography.- Cryptanalytic insights.- Modes and constructions.- Multilinear maps and IO.- Pseudorandomness.- Block cipher cryptanalysis.- Integrity.- Assumptions.- Hash functions and stream cipher cryptanalysis.- Implementations.- Multiparty computation.- Zero-knowledge.- Theory.- Signatures.- Non-signaling and information-theoretic crypto.- Attribute-based encryption.- New primitives.- Fully homomorphic/functional encryption.
Erscheint lt. Verlag | 11.8.2015 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XVIII, 787 p. 108 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1203 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | adaptive security • Algorithm analysis and problem complexity • Applications • asymmetric cryptography • biometric authentication • Cascade encryption • Computer Science • conference proceedings • deterministic encryption • formal methods • functional encryption • Informatics • Information Theory • Multi-Party Computation • privacy • Public Key Cryptography • Research • secure computation • Stream Ciphers • symmetric cryptography • Zero Knowledge |
ISBN-10 | 3-662-47988-5 / 3662479885 |
ISBN-13 | 978-3-662-47988-9 / 9783662479889 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €