Fr. 134.00

Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

English · Paperback / Softback

Shipping usually within 1 to 2 weeks (title will be printed to order)

Description

Read more

The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes werecarefully reviewed and selected from 274 submissions. The papers are organizedin topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking;fully homomorphic encryption; number theory; hash functions; multilinear maps;message authentification codes; attacks on SSL/TLS; real-world protocols;robust designs; lattice reduction; latticed-based schemes; zero-knowledge;pseudorandom functions; multi-party computation; separations; protocols; roundcomplexity; commitments; lattices; leakage; in differentiability; obfuscation; andautomated analysis, functional encryption, and non-malleable codes.
 

List of contents

Latticed-based schemes.- Zero-knowledge.- Pseudorandom functions.- Multi-party computation.- Separations.- Protocols.- Round complexity.- Commitments.- Lattices.- Leakage.- In differentiability.- Obfuscation.- Automated analysis, functional encryption, and non-malleable codes.

Summary

The two-volume proceedings LNCS 9665 + 9666
constitutes the thoroughly refereed proceedings of the 35th Annual
International Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were
carefully reviewed and selected from 274 submissions. The papers are organized
in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking;
fully homomorphic encryption; number theory; hash functions; multilinear maps;
message authentification codes; attacks on SSL/TLS; real-world protocols;
robust designs; lattice reduction; latticed-based schemes; zero-knowledge;
pseudorandom functions; multi-party computation; separations; protocols; round
complexity; commitments; lattices; leakage; in differentiability; obfuscation; and
automated analysis, functional encryption, and non-malleable codes.
 

Product details

Assisted by Coron (Editor), Coron (Editor), Jean-Sébastien Coron (Editor), Mar Fischlin (Editor), Marc Fischlin (Editor)
Publisher Springer, Berlin
 
Languages English
Product format Paperback / Softback
Released 01.01.2016
 
EAN 9783662498958
ISBN 978-3-662-49895-8
No. of pages 911
Dimensions 163 mm x 242 mm x 51 mm
Weight 1382 g
Illustrations XX, 911 p. 119 illus.
Series Lecture Notes in Computer Science
Security and Cryptology
Lecture Notes in Computer Science
Security and Cryptology
Subject Natural sciences, medicine, IT, technology > IT, data processing > IT

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.