Advances in Cryptology – EUROCRYPT 2016

35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II
Buch | Softcover
XX, 911 Seiten
2016 | 1st ed. 2016
Springer Berlin (Verlag)
978-3-662-49895-8 (ISBN)

Lese- und Medienproben

Advances in Cryptology – EUROCRYPT 2016 -
106,99 inkl. MwSt

The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016. The 62 full papers included in these volumes werecarefully reviewed and selected from 274 submissions. The papers are organizedin topical sections named: (pseudo)randomness; LPN/LWE; cryptanalysis; masking;fully homomorphic encryption; number theory; hash functions; multilinear maps;message authentification codes; attacks on SSL/TLS; real-world protocols;robust designs; lattice reduction; latticed-based schemes; zero-knowledge;pseudorandom functions; multi-party computation; separations; protocols; roundcomplexity; commitments; lattices; leakage; in differentiability; obfuscation; andautomated analysis, functional encryption, and non-malleable codes.

 

Latticed-based schemes.- Zero-knowledge.- Pseudorandom functions.- Multi-party computation.- Separations.- Protocols.- Round complexity.- Commitments.- Lattices.- Leakage.- In differentiability.- Obfuscation.- Automated analysis, functional encryption, and non-malleable codes.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XX, 911 p. 119 illus.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte authenticated encryption • Computational Complexity • computational complexity and cryptography • Countermeasures • cryptanalysis and other attacks • cryptographic primitives • cryptographic protocols • cryptography • data encryption • Embedded Security • Error-correcting codes • Hardware attacks • hardware attacks and countermeasures • Hash Functions • information-theoretic techniques • Interactive Proof Systems • Lattice-based cryptography • mathematical foundations of cryptography • oblivious transfer • Optimization • pseudo random number generation • public key (asymmetric) techniques • public-key encryption • quantum complexity theory • random number generation • Reverse-Engineering • secure computation • Security and Privacy • security in hardware • side-channel analysis and countermeasures • symmetric cryptography and hash functions • Theory of Computation • verification
ISBN-10 3-662-49895-2 / 3662498952
ISBN-13 978-3-662-49895-8 / 9783662498958
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
Mehr entdecken
aus dem Bereich