Advances in Cryptology – EUROCRYPT 2020 -

Advances in Cryptology – EUROCRYPT 2020

39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part I

Anne Canteaut, Yuval Ishai (Herausgeber)

Buch | Softcover
XXV, 797 Seiten
2020 | 1st ed. 2020
Springer International Publishing (Verlag)
978-3-030-45720-4 (ISBN)
106,99 inkl. MwSt

The three volume-set LNCS 12105, 12106, and 12107 constitute the thoroughly refereed proceedings of the 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2020, which was due to be held in Zagreb, Croatia, in May 2020. The conference was held virtually due to the COVID-19 pandemic.

The 81 full papers presented were carefully reviewed and selected from 375 submissions. The papers are organized into the following topical sections: invited talk; best paper awards; obfuscation and functional encryption; symmetric cryptanalysis; randomness extraction; symmetric cryptography I; secret sharing; fault-attack security; succinct proofs; generic models; secure computation I; quantum I; foundations; isogeny-based cryptography; lattice-based cryptography; symmetric cryptography II; secure computation II; asymmetric cryptanalysis; verifiable delay functions; signatures; attribute-based encryption; side-channel security; non-interactive zero-knowledge; public-key encryption; zero-knowledge; quantum II.

Invited Talk.- Best Paper Awards.- Obfuscation and Functional Encryption.- Symmetric Cryptanalysis.- Randomness Extraction.- Symmetric Cryptography I.- Secret Sharing.- Fault-Attack Security.- Succinct Proofs.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XXV, 797 p. 414 illus., 26 illus. in color.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1240 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Applications • authentication • Block Ciphers • ciphertexts • Computer Networks • Computer Science • Computer Security • Computer systems • computer vision • conference proceedings • Cryptanalysis • cryptography • Data Security • electronic document identification systems • Encryption • Hash Functions • Image Processing • Informatics • Network Protocols • Network Security • privacy • Public Key Cryptography • Research • Software Design • Software engineering
ISBN-10 3-030-45720-6 / 3030457206
ISBN-13 978-3-030-45720-4 / 9783030457204
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich