Advances in Cryptology – EUROCRYPT 2016 -

Advances in Cryptology – EUROCRYPT 2016

35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
Buch | Softcover
XXVIII, 853 Seiten
2016 | 1st ed. 2016
Springer Berlin (Verlag)
978-3-662-49889-7 (ISBN)
106,99 inkl. MwSt
The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were carefully reviewed and selected from 274 submissions. The papers are organized in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking; fully homomorphic encryption; number theory; hash functions; multilinear maps; message authentification codes; attacks on SSL/TLS; real-world protocols; robust designs; lattice reduction; latticed-based schemes; zero-knowledge; pseudorandom functions; multi-party computation; separations; protocols; round complexity; commitments; lattices; leakage; in differentiability; obfuscation; and automated analysis, functional encryption, and non-malleable codes.

(Pseudo)randomness.- LPN/LWE.- Cryptanalysis.- Masking.- Fully homomorphic encryption.- Number theory.- Hash functions.- Multilinear maps.- Message authentification codes.- Attacks on SSL/TLS.- Real-world protocols.- Robust designs.- Lattice reduction.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XXVIII, 853 p. 155 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Algorithm analysis and problem complexity • authenticated encryption • Computational Complexity • Countermeasures • data encryption • Discrete mathematics in computer science • Embedded Security • Error-correcting codes • Hardware attacks • Hash Functions • information-theoretic techniques • Lattice-based cryptography • management of computing and information systems • mathematical foundations of cryptography • oblivious transfer • Optimization • pseudo random number generation • public-key encryption • quantum complexity theory • random number generation • Reverse-Engineering • secure computation • Security and Privacy • systems and data security • verification
ISBN-10 3-662-49889-8 / 3662498898
ISBN-13 978-3-662-49889-7 / 9783662498897
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich