0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II (Paperback, 1st ed. 2019)
Dongdai Lin, Kazue Sako
R2,536 Discovery Miles 25 360 Ships in 18 - 22 working days

The two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography.

Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March... Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings (Paperback, 1st ed. 2019)
Mitsuru Matsui
R1,488 Discovery Miles 14 880 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2019, CT-RSA 2019, held in San Francisco, CA, USA, in March 2019. The 28 papers presented in this volume were carefully reviewed and selected from 75 submissions. CT-RSA is the track devoted to scientific papers on cryptography, public-key to symmetric-key cryptography and from crypto- graphic protocols to primitives and their implementation security.

Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,238 Discovery Miles 42 380 Ships in 18 - 22 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23,... Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I (Paperback, 1st ed. 2018)
Hovav Shacham, Alexandra Boldyreva
R2,802 Discovery Miles 28 020 Ships in 18 - 22 working days

The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.

Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy,... Cellular Automata - 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, Como, Italy, September 17-21, 2018, Proceedings (Paperback, 1st ed. 2018)
Giancarlo Mauri, Samira El Yacoubi, Alberto Dennunzio, Katsuhiro Nishinari, Luca Manzoni
R1,475 Discovery Miles 14 750 Ships in 18 - 22 working days

This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018. The 47 full papers presented in this volume were carefully reviewed and selected from 64 submissions.This volume contains invited contributions and accepted papers from the main track and from the three organized workshops. The volume is organized in the following topics: biological systems modeling; simulation and other applications of CA; multi-agent systems; pedestrian and traffic dynamics; synchronization and control; theory and cryptography; asynchronous cellular automata; and crowds, traffic and cellular automata.

Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018,... Constructive Side-Channel Analysis and Secure Design - 9th International Workshop, COSADE 2018, Singapore, April 23-24, 2018, Proceedings (Paperback, 1st ed. 2018)
Junfeng Fan, Benedikt Gierlichs
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes revised selected papers from the 9th International Workshop on Constructive Side-Channel Analysis and Secure Design, COSADE 2018, held in Singapore, in April 2018.The 14 papers presented in this volume were carefully reviewed and selected from 31 submissions. They were organized in topical sections named: countermeasures against side-channel attacks; tools for side-channel analysis; fault attacks and hardware trojans; and side-channel analysis attacks.

Practical Cryptography (Paperback): N. Ferguson Practical Cryptography (Paperback)
N. Ferguson
R1,021 R851 Discovery Miles 8 510 Save R170 (17%) Ships in 9 - 17 working days

Security is the number one concern for businesses worldwide. The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies.
Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers.
Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22,... Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings (Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
R1,409 Discovery Miles 14 090 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of... Cryptology Transmitted Message Protection - From Deterministic Chaos up to Optical Vortices (Paperback, Softcover reprint of the original 1st ed. 2016)
Igor Izmailov, Boris Poizner, Ilia Romanov, Sergey Smolskiy
R3,642 Discovery Miles 36 420 Ships in 18 - 22 working days

This book presents methods to improve information security for protected communication. It combines and applies interdisciplinary scientific engineering concepts, including cryptography, chaos theory, nonlinear and singular optics, radio-electronics and self-changing artificial systems. It also introduces additional ways to improve information security using optical vortices as information carriers and self-controlled nonlinearity, with nonlinearity playing a key "evolving" role. The proposed solutions allow the universal phenomenon of deterministic chaos to be discussed in the context of information security problems on the basis of examples of both electronic and optical systems. Further, the book presents the vortex detector and communication systems and describes mathematical models of the chaos oscillator as a coder in the synchronous chaotic communication and appropriate decoders, demonstrating their efficiency both analytically and experimentally. Lastly it discusses the cryptologic features of analyzed systems and suggests a series of new structures for confident communication.

Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised... Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Carlisle Adams, Jan Camenisch
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book contains revised selected papers from the 24th International Conference on Selected Areas in Cryptography, SAC 2017, held in Ottawa, ON, Canada in August 2017. The 23 full papers presented in this volume were carefully reviewed and selected from 66 submissions. The focus of the conference was on specific themes in the area of cryptographic system design and analysis such as: Design and analysis of symmetric key cryptosystems Primitives for symmetric key cryptography, including block and stream ciphers, hash functions, and MAC algorithms Efficient implementations of symmetric and public key algorithms

Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta,... Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, …
R3,105 Discovery Miles 31 050 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.The 39 full papers presented were carefully reviewed and selected from 96 submissions. They feature the outcome of the 5th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, WAHC 2017, the 4th Workshop on Bitcoin and Blockchain Research, BITCOIN 2017, the Second Workshop on Secure Voting Systems, VOTING 2017, the First Workshop on Trusted Smart Contracts, WTSC 2017, and the First Workshop on Targeted Attacks, TA 2017.The papers are grouped in topical sections named: encrypted computing and applied homomorphic cryptography; bitcoin and blockchain research; advances in secure electronic voting schemes; trusted smart contracts; targeted attacks.

Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016,... Selected Areas in Cryptography - SAC 2016 - 23rd International Conference, St. John's, NL, Canada, August 10-12, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Roberto Avanzi, Howard Heys
R2,936 Discovery Miles 29 360 Ships in 18 - 22 working days

This book contains revised selected papers from the 23rd International Conference on Selected Areas in Cryptography, SAC 2016, held in St. John's, NL, Canada in August 2016. The 28 full papers and 2 invited papers presented in this volume were carefully reviewed and selected from 100 submissions. They are organized in the following topical sections: side channels and fault attacks; design and implementation of symmetric cryptography; efficient symmetric primitives; cryptanalysis of symmetric primitives; MACs and PRNGs; lattice-based cryptography; and cryptanalysis of asymmetric primitives.

Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and... Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Tsuyoshi Takagi, Thomas Peyrin
R2,661 Discovery Miles 26 610 Ships in 18 - 22 working days

The three-volume set LNCS 10624, 10625, 10626 constitutes the refereed proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2017, held in Hong Kong, China, in December 2017.The 65 revised full papers were carefully selected from 243 submissions. They are organized in topical sections on Post-Quantum Cryptography; Symmetric Key Cryptanalysis; Lattices; Homomorphic Encryptions; Access Control; Oblivious Protocols; Side Channel Analysis; Pairing-based Protocols; Quantum Algorithms; Elliptic Curves; Block Chains; Multi-Party Protocols; Operating Modes Security Proofs; Cryptographic Protocols; Foundations; Zero-Knowledge Proofs; and Symmetric Key Designs.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R1,543 Discovery Miles 15 430 Ships in 18 - 22 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings... Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Tatsuaki Okamoto, Yong Yu, Man-Ho Au, Yannan Li
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Provable Security, ProvSec 2017, held in Xi'an, China, in October 2017. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 76 submissions. The papers are grouped in topical sections on secure cloud storage and computing; digital signature and authentication; authenticated encryption and key exchange; security models; lattice and post-quantum cryptography; public key encryption and signcryption; proxy re-encryption and functional encryption; protocols.

Service-Oriented and Cloud Computing - 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017,... Service-Oriented and Cloud Computing - 6th IFIP WG 2.14 European Conference, ESOCC 2017, Oslo, Norway, September 27-29, 2017, Proceedings (Paperback, 1st ed. 2017)
Flavio De Paoli, Stefan Schulte, Einar Broch Johnsen
R2,026 Discovery Miles 20 260 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th IFIP WG 2.14 European Conference on Service-Oriented and Cloud Computing, ESOCC 2017, held in Oslo, Norway, in September 2017. The 6 short and 10 full papers presented in this volume were carefully reviewed and selected from 37 submissions. The volume also contains one invited talk in full paper length. The contributions were organized in topical sections named: microservices and containers; security; cloud resources; services; internet of things and data streams; and industrial applications of service and cloud computing.

Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13,... Progress in Cryptology - INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings (Paperback, 1st ed. 2017)
Arpita Patra, Nigel P. Smart
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions.

Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8,... Trust, Privacy and Security in Digital Business - 13th International Conference, TrustBus 2016, Porto, Portugal, September 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Sokratis Katsikas, Costas Lambrinoudakis, Steven Furnell
R1,493 Discovery Miles 14 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2016, held in Porto, Portugal, in September 2016 in conjunction with DEXA 2016. The 8 revised full papers presented were carefully reviewed and selected from 18 submissions. The papers are organized in the following topical sections: security, privacy and trust in eServices; security and privacy in cloud computing; privacy requirements; and information audit and trust.

Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017,... Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings (Paperback, 1st ed. 2017)
Wieland Fischer, Naofumi Homma
R2,774 Discovery Miles 27 740 Ships in 18 - 22 working days

This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The 33 full papers presented in this volume were carefully reviewed and selected from 130 submissions. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations. The workshop builds a valuable bridge between the research and cryptographic engineering communities and attracts participants from industry, academia, and government organizations.

Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017,... Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings (Paperback, 1st ed. 2017)
Junji Shikata
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I... Theory of Cryptography - 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I (Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
R2,792 Discovery Miles 27 920 Ships in 18 - 22 working days

The two-volume set LNCS 10677 and LNCS 10678 constitutes the refereed proceedings of the 15th International Conference on Theory of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November 2017. The total of 51 revised full papers presented in the proceedings were carefully reviewed and selected from 150 submissions. The Theory of Cryptography Conference deals with the paradigms, approaches, and techniques used to conceptualize natural cryptographic problems and provide algorithmic solutions to them and much more.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,776 Discovery Miles 27 760 Ships in 18 - 22 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Digital Forensics and Watermarking - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017,... Digital Forensics and Watermarking - 16th International Workshop , IWDW 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings (Paperback, 1st ed. 2017)
Christian Kraetzer, Yun Qing Shi, Jana Dittmann, Hyoung Joong Kim
R2,513 Discovery Miles 25 130 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 16th International Workshop on Digital Forensics and Watermarking, IWDW 2017, held in Magdeburg, Germany, in August 2017. The 30 papers presented in this volume were carefully reviewed and selected from 48 submissions. The contributions are covering the state-of-the-art theoretical and practical developments in the fields of digital watermarking, steganography and steganalysis, forensics and anti-forensics, visual cryptography, and other multimedia-related security issues. Also included are the papers on two special sessions on biometric image tampering detection and on emerging threats of criminal use of information hiding : usage scenarios and detection approaches.

Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016,... Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (Paperback, 1st ed. 2016)
Joseph K. Liu, Ron Steinfeld
R2,851 Discovery Miles 28 510 Ships in 18 - 22 working days

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24,... Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Paperback, 1st ed. 2017)
Jonathan Katz, Hovav Shacham
R2,771 Discovery Miles 27 710 Ships in 18 - 22 working days

The three volume-set, LNCS 10401, LNCS 10402, and LNCS 10403, constitutes the refereed proceedings of the 37th Annual International Cryptology Conference, CRYPTO 2017, held in Santa Barbara, CA, USA, in August 2017. The 72 revised full papers presented were carefully reviewed and selected from 311 submissions. The papers are organized in the following topical sections: functional encryption; foundations; two-party computation; bitcoin; multiparty computation; award papers; obfuscation; conditional disclosure of secrets; OT and ORAM; quantum; hash functions; lattices; signatures; block ciphers; authenticated encryption; public-key encryption, stream ciphers, lattice crypto; leakage and subversion; symmetric-key crypto, and real-world crypto.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Colour Engineering - Achieving Device…
P. Green Hardcover R4,328 Discovery Miles 43 280
The Making of Consumer Law and Policy in…
Hans W. Micklitz Hardcover R3,680 Discovery Miles 36 800
I Give You Credit - A Do It Yourself…
Carlos Ariel Then Paperback R527 R482 Discovery Miles 4 820
Communication and Computing for…
Guojun Lu Hardcover R3,536 Discovery Miles 35 360
Information Retrieval for Music and…
Meinard Muller Hardcover R1,446 Discovery Miles 14 460
Procedural Autonomy Across Europe
Bart Krans, Anna Nylund Paperback R2,498 Discovery Miles 24 980
Using Soundtrack - Produce Original…
Douglas Spotted Eagle Paperback R1,389 Discovery Miles 13 890
A Practical Guide to the Ending of…
Elizabeth Dwomoh Paperback R1,950 Discovery Miles 19 500
Multimedia Retrieval
Henk M. Blanken, Arjen P. De Vries, … Hardcover R1,462 Discovery Miles 14 620
Performance-Oriented Remedies in…
Vanessa Mak Hardcover R3,347 Discovery Miles 33 470

 

Partners