Advances in Cryptology – EUROCRYPT 2016
Springer Berlin (Verlag)
978-3-662-49895-8 (ISBN)
The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes werecarefully reviewed and selected from 274 submissions. The papers are organizedin topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking;fully homomorphic encryption; number theory; hash functions; multilinear maps;message authentification codes; attacks on SSL/TLS; real-world protocols;robust designs; lattice reduction; latticed-based schemes; zero-knowledge;pseudorandom functions; multi-party computation; separations; protocols; roundcomplexity; commitments; lattices; leakage; in differentiability; obfuscation; andautomated analysis, functional encryption, and non-malleable codes.
Latticed-based schemes.- Zero-knowledge.- Pseudorandom functions.- Multi-party computation.- Separations.- Protocols.- Round complexity.- Commitments.- Lattices.- Leakage.- In differentiability.- Obfuscation.- Automated analysis, functional encryption, and non-malleable codes.
Erscheinungsdatum | 08.10.2016 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XX, 911 p. 119 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authenticated encryption • Computational Complexity • computational complexity and cryptography • Countermeasures • cryptanalysis and other attacks • cryptographic primitives • cryptographic protocols • cryptography • data encryption • Embedded Security • Error-correcting codes • Hardware attacks • hardware attacks and countermeasures • Hash Functions • information-theoretic techniques • Interactive Proof Systems • Lattice-based cryptography • mathematical foundations of cryptography • oblivious transfer • Optimization • pseudo random number generation • public key (asymmetric) techniques • public-key encryption • quantum complexity theory • random number generation • Reverse-Engineering • secure computation • Security and Privacy • security in hardware • side-channel analysis and countermeasures • symmetric cryptography and hash functions • Theory of Computation • verification |
ISBN-10 | 3-662-49895-2 / 3662498952 |
ISBN-13 | 978-3-662-49895-8 / 9783662498958 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich