Theory of Cryptography
13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I
Seiten
2016
|
1st ed. 2016
Springer Berlin (Verlag)
978-3-662-49095-2 (ISBN)
Springer Berlin (Verlag)
978-3-662-49095-2 (ISBN)
The two-volume set LNCS 9562 and LNCS 9563 constitutes the refereedproceedings of the 13th International Conference on Theory ofCryptography, TCC 2016, held in Tel Aviv, Israel, in January 2016.
The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.
The 45 revised full papers presented were carefully reviewed andselected from 112 submissions. The papers are organized in topicalsections on obfuscation, differential privacy, LWR and LPN, public key encryption, signatures, and VRF, complexity of cryptographic primitives, multiparty computation, zero knowledge and PCP, oblivious RAM, ABE and IBE, and codes and interactive proofs. The volume also includes an invited talk on cryptographic assumptions.
Erscheinungsdatum | 26.01.2016 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 618 p. 63 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | adaptive security • Applications • approximation algorithms • Authenticated encryption schemes • Computational Complexity • Computer Science • conference proceedings • data encryption • deterministic encryption • differential privacy • Digital Signatures • functional encryption • homomorphic encryption • Informatics • Learning theory • Linear error correcting codes • multilinear maps • multiparty computation • obfuscation • One-way functions • pseudorandom generators • Public-Key Cryptography • public-key encryption • Research • Tight security proofs • Zero Knowledge |
ISBN-10 | 3-662-49095-1 / 3662490951 |
ISBN-13 | 978-3-662-49095-2 / 9783662490952 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €