Fr. 135.00

Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

Inglese · Tascabile

Spedizione di solito entro 6 a 7 settimane

Descrizione

Ulteriori informazioni

The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes werecarefully reviewed and selected from 274 submissions. The papers are organizedin topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking;fully homomorphic encryption; number theory; hash functions; multilinear maps;message authentification codes; attacks on SSL/TLS; real-world protocols;robust designs; lattice reduction; latticed-based schemes; zero-knowledge;pseudorandom functions; multi-party computation; separations; protocols; roundcomplexity; commitments; lattices; leakage; in differentiability; obfuscation; andautomated analysis, functional encryption, and non-malleable codes.
 

Sommario

Latticed-based schemes.- Zero-knowledge.- Pseudorandom functions.- Multi-party computation.- Separations.- Protocols.- Round complexity.- Commitments.- Lattices.- Leakage.- In differentiability.- Obfuscation.- Automated analysis, functional encryption, and non-malleable codes.

Riassunto

The two-volume proceedings LNCS 9665 + 9666
constitutes the thoroughly refereed proceedings of the 35th Annual
International Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes were
carefully reviewed and selected from 274 submissions. The papers are organized
in topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking;
fully homomorphic encryption; number theory; hash functions; multilinear maps;
message authentification codes; attacks on SSL/TLS; real-world protocols;
robust designs; lattice reduction; latticed-based schemes; zero-knowledge;
pseudorandom functions; multi-party computation; separations; protocols; round
complexity; commitments; lattices; leakage; in differentiability; obfuscation; and
automated analysis, functional encryption, and non-malleable codes.
 

Recensioni dei clienti

Per questo articolo non c'è ancora nessuna recensione. Scrivi la prima recensione e aiuta gli altri utenti a scegliere.

Scrivi una recensione

Top o flop? Scrivi la tua recensione.

Per i messaggi a CeDe.ch si prega di utilizzare il modulo di contatto.

I campi contrassegnati da * sono obbligatori.

Inviando questo modulo si accetta la nostra dichiarazione protezione dati.