|
Showing 1 - 9 of
9 matches in All Departments
The three volumes LNCS 10820, 10821, and 10822 constitute the
thoroughly refereed proceedings of the 37th Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May
2018. The 69 full papers presented were carefully reviewed and
selected from 294 submissions. The papers are organized into the
following topical sections: foundations; lattices; random oracle
model; fully homomorphic encryption; permutations; galois counter
mode; attribute-based encryption; secret sharing; blockchain;
multi-collision resistance; signatures; private simultaneous
messages; masking; theoretical multiparty computation; obfuscation;
symmetric cryptanalysis; zero-knowledge; implementing multiparty
computation; non-interactive zero-knowledge; anonymous
communication; isogeny; leakage; key exchange; quantum;
non-malleable codes; and provable symmetric cyptography.
The three volumes LNCS 10820, 10821, and 10822 constitute the
thoroughly refereed proceedings of the 37th Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May
2018. The 69 full papers presented were carefully reviewed and
selected from 294 submissions. The papers are organized into the
following topical sections: foundations; lattices; random oracle
model; fully homomorphic encryption; permutations; galois counter
mode; attribute-based encryption; secret sharing; blockchain;
multi-collision resistance; signatures; private simultaneous
messages; masking; theoretical multiparty computation; obfuscation;
symmetric cryptanalysis; zero-knowledge; implementing multiparty
computation; non-interactive zero-knowledge; anonymous
communication; isogeny; leakage; key exchange; quantum;
non-malleable codes; and provable symmetric cyptography.
The three volumes LNCS 10820, 10821, and 10822 constitute the
thoroughly refereed proceedings of the 37th Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May
2018. The 69 full papers presented were carefully reviewed and
selected from 294 submissions. The papers are organized into the
following topical sections: foundations; lattices; random oracle
model; fully homomorphic encryption; permutations; galois counter
mode; attribute-based encryption; secret sharing; blockchain;
multi-collision resistance; signatures; private simultaneous
messages; masking; theoretical multiparty computation; obfuscation;
symmetric cryptanalysis; zero-knowledge; implementing multiparty
computation; non-interactive zero-knowledge; anonymous
communication; isogeny; leakage; key exchange; quantum;
non-malleable codes; and provable symmetric cryptography.
The three-volume proceedings LNCS 10210-10212 constitute the
thoroughly refereed proceedings of the 36th Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2017, held in Paris, France, in April/May
2017. The 67 full papers included in these volumes were carefully
reviewed and selected from 264 submissions. The papers are
organized in topical sections named: lattice attacks and
constructions; obfuscation and functional encryption; discrete
logarithm; multiparty computation; universal composability; zero
knowledge; side-channel attacks and countermeasures; functional
encryption; elliptic curves; symmetric cryptanalysis; provable
security for symmetric cryptography; security models; blockchain;
memory hard functions; symmetric-key constructions; obfuscation;
quantum cryptography; public-key encryption and key-exchange.
The three-volume proceedings LNCS 10210-10212 constitute the
thoroughly refereed proceedings of the 36th Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2017, held in Paris, France, in April/May
2017. The 67 full papers included in these volumes were carefully
reviewed and selected from 264 submissions. The papers are
organized in topical sections named: lattice attacks and
constructions; obfuscation and functional encryption; discrete
logarithm; multiparty computation; universal composability; zero
knowledge; side-channel attacks and countermeasures; functional
encryption; elliptic curves; symmetric cryptanalysis; provable
security for symmetric cryptography; security models; blockchain;
memory hard functions; symmetric-key constructions; obfuscation;
quantum cryptography; public-key encryption and key-exchange.
The three-volume proceedings LNCS 10210-10212 constitute the
thoroughly refereed proceedings of the 36th Annual International
Conference on the Theory and Applications of Cryptographic
Techniques, EUROCRYPT 2017, held in Paris, France, in April/May
2017. The 67 full papers included in these volumes were carefully
reviewed and selected from 264 submissions. The papers are
organized in topical sections named: lattice attacks and
constructions; obfuscation and functional encryption; discrete
logarithm; multiparty computation; universal composability; zero
knowledge; side-channel attacks and countermeasures; functional
encryption; elliptic curves; symmetric cryptanalysis; provable
security for symmetric cryptography; security models; blockchain;
memory hard functions; symmetric-key constructions; obfuscation;
quantum cryptography; public-key encryption and key-exchange.
In a data-driven society, individuals and companies encounter
numerous situations where private information is an important
resource. How can parties handle confidential data if they do not
trust everyone involved? This text is the first to present a
comprehensive treatment of unconditionally secure techniques for
multiparty computation (MPC) and secret sharing. In a secure MPC,
each party possesses some private data, while secret sharing
provides a way for one party to spread information on a secret such
that all parties together hold full information, yet no single
party has all the information. The authors present basic
feasibility results from the last 30 years, generalizations to
arbitrary access structures using linear secret sharing, some
recent techniques for efficiency improvements, and a general
treatment of the theory of secret sharing, focusing on asymptotic
results with interesting applications related to MPC.
|
Theory of Cryptography - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II (Paperback, 2015 ed.)
Yevgeniy Dodis, Jesper Buus Nielsen
|
R1,646
Discovery Miles 16 460
|
Ships in 10 - 15 working days
|
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed
proceedings of the 12th International Conference on Theory of
Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The
52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and
tampering, privacy amplification, encryption an key exchange,
pseudorandom functions and applications, proofs and verifiable
computation, differential privacy, functional encryption,
obfuscation.
|
Theory of Cryptography - 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I (Paperback, 2015 ed.)
Yevgeniy Dodis, Jesper Buus Nielsen
|
R1,634
Discovery Miles 16 340
|
Ships in 10 - 15 working days
|
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed
proceedings of the 12th International Conference on Theory of
Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The
52 revised full papers presented were carefully reviewed and
selected from 137 submissions. The papers are organized in topical
sections on foundations, symmetric key, multiparty computation,
concurrent and resettable security, non-malleable codes and
tampering, privacy amplification, encryption an key exchange,
pseudorandom functions and applications, proofs and verifiable
computation, differential privacy, functional encryption,
obfuscation.
|
You may like...
Becoming
Michelle Obama
CD
(1)
R579
R479
Discovery Miles 4 790
|