Advances in Cryptology – EUROCRYPT 2017 -

Advances in Cryptology – EUROCRYPT 2017

36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II
Buch | Softcover
XXI, 677 Seiten
2017 | 1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-56613-9 (ISBN)
96,29 inkl. MwSt
The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017.
The 67 full papers included in these volumes were carefully reviewed and selected from 264 submissions. The papers are organized in topical sections named: lattice attacks and constructions; obfuscation and functional encryption; discrete logarithm; multiparty computation; universal composability; zero knowledge; side-channel attacks and countermeasures; functional encryption; elliptic curves; symmetric cryptanalysis; provable security for symmetric cryptography; security models; blockchain; memory hard functions; symmetric-key constructions; obfuscation; quantum cryptography; public-key encryption and key-exchange.

Lattice attacks and constructions.- Obfuscation and functional encryption.- Discrete logarithm.- Multiparty computation.- Universal composability.- Zero knowledge.- Side-channel attacks and countermeasures.- Functional encryption.- Elliptic curves.- Symmetric cryptanalysis.- Provable security for symmetric cryptography.- security models:- Blockchain.- Memory hard functions.- Symmetric-key constructions.- Obfuscation.- Quantum cryptography.- Public-key encryption and key-exchange.

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XXI, 677 p. 66 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 1056 g
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte algorithms • Applications • Computer Science • Computer Security • conference proceedings • Cryptanalysis • cryptography • data encryption • Discrete Mathematics • Discrete mathematics in computer science • electronic signatures • elliptic-curves • hash function • homomorphic encryption • Informatics • information architecture • lattices • Maintenance and repairs • management of computing and information systems • Maths for computer scientists • memory-hard functions • mixed integer linear programming • Multi-Party Computation • multi-user security • Network Security • password hashing • post-quantum cryptography • public-key encryption • Quantum Security • Research • Security models • side-channel attacks • Software engineering • symmetric cryptography • symmetric-key encryption • systems and data security
ISBN-10 3-319-56613-X / 331956613X
ISBN-13 978-3-319-56613-9 / 9783319566139
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
Mehr entdecken
aus dem Bereich