Public-Key Cryptography – PKC 2017
20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II
Seiten
2017
|
1st ed. 2017
Springer Berlin (Verlag)
978-3-662-54387-0 (ISBN)
Springer Berlin (Verlag)
978-3-662-54387-0 (ISBN)
The two-volume set LNCS 10174 and 10175 constitutes the refereed proceedings of the 20th IACR International Conference on the Practice and Theory in Public-Key Cryptography, PKC 2017, held in Amsterdam, The Netherlands, in March 2017.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
The 34 revised papers presented were carefully reviewed and selected from 160 submissions. They are organized in topical sections such as Cryptanalysis, Protocols, Encryption Schemes, Leakage-Resilient and Non-Malleable Codes, Number Theory and Diffie-Hellman, Encryption with Access Control, Special Signatures, Fully Homomorphic Encryption, Real-World Schemes, Multiparty Computation and Primitives.
Cryptanalysis, Protocols.- Encryption Schemes.- Leakage-Resilient and Non-Malleable Codes.- Number Theory and Die-Hellman.- Encryption with Access Control.- Special Signatures.- Fully Homomorphic Encryption.- Real-World Schemes.- Multiparty Computation.- Primitives.
Erscheinungsdatum | 14.03.2017 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 556 p. 81 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 866 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • algorithms and data structures • Applications • Coding and information theory • Coding theory and cryptology • Computer Communication Networks • Computer Science • Computer Security • conference proceedings • Cryptanalysis • data encryption • Elliptic Curve Cryptography • Informatics • information architecture • Information Theory • Linear Programming • Maintenance and repairs • management of computing and information systems • network hardware • Network Security • oblivious transfer • provable security • Research • systems and data security |
ISBN-10 | 3-662-54387-7 / 3662543877 |
ISBN-13 | 978-3-662-54387-0 / 9783662543870 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €