|
Showing 1 - 4 of
4 matches in All Departments
This book constitutes the refereed proceedings of the 16th
International Conference on Practice and Theory in Public-Key
Cryptography, PKC 2013, held in Nara, Japan, in February/March
2013. The 28 papers presented together with 2 invited talks were
carefully reviewed and selected from numerous submissions. The
papers are organized in the following topical sections: homomorphic
encryption, primitives, functional encryption/signatures, RSA, IBE
and IPE, key exchange, signature schemes, encryption, and
protocols.
This book constitutes the refereed proceedings of the 7th
International Workshop on Security, IWSEC 2012, held in Fukuoka,
Japan, in November 2012. The 16 revised selected papers presented
in this volume were carefully reviewed and selected from 53
submissions. They are organized in topical sections named:
implementation; encryption and key exchange; cryptanalysis; and
secure protocols.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the
refereed proceedings of the 25th IACR International Conference on
Practice and Theory of Public Key Cryptography, PKC 2022, which
took place virtually during March 7-11, 2022. The conference was
originally planned to take place in Yokohama, Japan, but had to
change to an online format due to the COVID-19 pandemic.The 40
papers included in these proceedings were carefully reviewed and
selected from 137 submissions. They focus on all aspects of
public-key cryptography, covering cryptanalysis; MPC and secret
sharing; cryptographic protocols; tools; SNARKs and NIZKs; key
exchange; theory; encryption; and signatures.
The two-volume proceedings set LNCS 13177 and 13178 constitutes the
refereed proceedings of the 25th IACR International Conference on
Practice and Theory of Public Key Cryptography, PKC 2022, which
took place virtually during March 7-11, 2022. The conference was
originally planned to take place in Yokohama, Japan, but had to
change to an online format due to the COVID-19 pandemic.The 40
papers included in these proceedings were carefully reviewed and
selected from 137 submissions. They focus on all aspects of
public-key cryptography, covering cryptanalysis; MPC and secret
sharing; cryptographic protocols; tools; SNARKs and NIZKs; key
exchange; theory; encryption; and signatures.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|