Advances in Cryptology – CRYPTO 2018
38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III
Seiten
2018
|
1st ed. 2018
Springer International Publishing (Verlag)
978-3-319-96877-3 (ISBN)
Springer International Publishing (Verlag)
978-3-319-96877-3 (ISBN)
The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.
Secure messaging.- Implementations and physical attacks prevention.- Authenticated and format-preserving encryption.- Cryptoanalysis.- Searchable encryption and differential privacy.- Secret sharing.- Encryption.- Symmetric cryptography.- Proofs of work and proofs of Stake.- Proof tools.- Key exchange.- Symmetric cryptoanalysis.- Hashes and random oracles.- Trapdoor functions.- Round optimal MPC.- Foundations.- Lattices.- Lattice-based ZK.- Efficient MPC.- Quantum cryptography.- MPC.- Garbling.- Information-theoretic MPC.- Oblivious transfer.- Non-malleable codes.- Zero knowledge.- Obfuscation.
Erscheinungsdatum | 25.07.2018 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XV, 787 p. 93 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1194 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • block and stream ciphers • Communication • Computer Science • cryptanalysis and other attacks • cryptography • Digital Signatures • Encryption • homomorphic encryption • information-theoretic techniques • Key Management • mathematical foundations of cryptography • privacy preserving • public key (asymmetric) techniques • Public Key Cryptography • public key encryption • public-key encryption • Software engineering • symmetric cryptography and hash functions |
ISBN-10 | 3-319-96877-7 / 3319968777 |
ISBN-13 | 978-3-319-96877-3 / 9783319968773 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Geschichte, Techniken, Anwendungen
Buch | Softcover (2022)
C.H.Beck (Verlag)
9,95 €
Die faszinierende Geschichte der Verschlüsselung
Buch | Softcover (2022)
Springer (Verlag)
34,99 €