Advances in Cryptology – EUROCRYPT 2017
36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III
Seiten
2017
|
1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-56616-0 (ISBN)
Springer International Publishing (Verlag)
978-3-319-56616-0 (ISBN)
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.
Lattice attacks and constructions.- Obfuscation and functional encryption.- Discrete logarithm.- Multiparty computation.- Universal composability.- Zero knowledge.- Side-channel attacks and countermeasures.- Functional encryption.- Elliptic curves.- Symmetric cryptanalysis.- Provable security for symmetric cryptography.- security models:- Blockchain.- Memory hard functions.- Symmetric-key constructions.- Obfuscation.- Quantum cryptography.- Public-key encryption and key-exchange.
Erscheinungsdatum | 26.04.2017 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XXI, 641 p. 54 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1003 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algorithms • Applications • Computer Science • Computer Security • conference proceedings • Cryptanalysis • cryptography • data encryption • Discrete Mathematics • Discrete mathematics in computer science • electronic signatures • elliptic-curves • hash function • homomorphic encryption • Informatics • information architecture • lattices • Maintenance and repairs • management of computing and information systems • Maths for computer scientists • memory-hard functions • mixed integer linear programming • Multi-Party Computation • multi-user security • Network Security • password hashing • post-quantum cryptography • public-key encryption • Quantum Security • Research • Security models • side-channel attacks • Software engineering • symmetric cryptography • symmetric-key encryption • systems and data security |
ISBN-10 | 3-319-56616-4 / 3319566164 |
ISBN-13 | 978-3-319-56616-0 / 9783319566160 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €